64
COUNTERTERRORISM SINCE 9/11 Evaluating the Efficacy of Controversial Tactics BY NICK ADAMS, TED NORDHAUS AND MICHAEL SHELLENBERGER THE SCIENCE OF SECURITY A project of the Breakthrough Institute

COUNTERTERRORISM SINCE 9/11

  • Upload
    dohanh

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

Page 1: COUNTERTERRORISM SINCE 9/11

COUNTERTERRORISMSINCE 9/11Evaluating the Efficacy of

Controversial Tactics

BY NICK ADAMS, TED NORDHAUS AND MICHAEL SHELLENBERGER

T H E S C I E N C E O F S E C U R I T Y

A p r o j e c t o f t h e B r e a k t h r o u g h I n s t i t u t e

Page 2: COUNTERTERRORISM SINCE 9/11

S P R I N G 2011

COUNTERTERRORISMSINCE 9/11Evaluating the Efficacy of

Controversial Tactics

BY NICK ADAMS, TED NORDHAUS AND MICHAEL SHELLENBERGER

4 3 6 1 4 T H S T R E E T, S U I T E 8 2 0 , O A K L A N D , C A 9 4 6 1 2 ,

P H O N E : 5 1 0 - 5 5 0 - 8 8 0 0 W E B S I T E : w w w. t h e b r e a k t h r o u g h . o r g

Page 3: COUNTERTERRORISM SINCE 9/11

TABLE OF CONTENTS ....................................................................3

EXECUTIVE SUMMARY..................................................................4

Key Findings ...........................................................................................4

INTRODUCTION.............................................................................6

EVALUATIVE METHODS .................................................................7

Previous CT Evaluation.............................................................................7

Our Approach ..........................................................................................7

TACTICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTERTERRORISM 10

The Evolution of U.S. CT Strategy ............................................................10

The Emerging Counterterrorism Strategy ...................................................13

Operational Challenges to CT: Sorting Information, Coordinating Intelligence 14

EVALUATING CONTROVERSIAL COUNTERTERRORISM TACTICS ........16

Expanded Surveillance and Search Tools ..................................................16

Ethnic/Religious and Behavioral Profiling .................................................23

‘Enhanced Interrogation Techniques’17 ....................................................28

Detention and Prosecution of Terrorism Suspects ......................................35

DISCUSSION AND CONCLUSIONS .................................................40

RECOMMENDATIONS...................................................................41

AUTHORS’ NOTE .........................................................................43

WORKS CITED ............................................................................44

ENDNOTES .................................................................................46

EXTENDED BIBLIOGRAPHY...........................................................48S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

TABLE OF CONTENTS ..............................................................3

EXECUTIVE SUMMARY ............................................................4

Key Findings ...................................................................................4

INTRODUCTION......................................................................6

EVALUATIVE METHODS............................................................7

Previous CT Evaluation ......................................................................7

Our Approach ..................................................................................7

TACTICS IN CONTEXT:

THE STRATEGY AND CHALLENGES OF COUNTERTERRORISM ..........10

The Evolution of U.S. CT Strategy .......................................................10

The Emerging Counterterrorism Strategy ..............................................13

Operational Challenges to CT:

Sorting Information, Coordinating Intelligence ..........................................14

EVALUATING CONTROVERSIAL COUNTERTERRORISM TACTICS .......16

Expanded Surveillance and Search Tools .............................................16

Ethnic/Religious and Behavioral Profiling .............................................23

‘Enhanced Interrogation Techniques’ ...................................................28

Detention and Prosecution of Terrorism Suspects ...................................35

DISCUSSION AND CONCLUSIONS .............................................40

RECOMMENDATIONS .............................................................41

TABLE OF CONTENTS

AUTHORS’ NOTE 43WORKS CITED 44ENDNOTES 46EXTENDED BIBLIOGRAPHY 48

Page 4: COUNTERTERRORISM SINCE 9/11

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

4

In the wake of 9/11, the U.S. government employed several new counterterrorism (CT) tactics,

some of which aroused a great deal of controversy. The controversial tactics included ‘enhanced’

interrogation, preventative detention, expanded use of secret surveillance without warrants,

ethnic/religious profiling, the collection and mining of domestic data, and the prosecution of terror

suspects in military tribunals. While there has been great debate over the morality and legality

of these controversial measures, there has been significantly less attention dedicated to evaluating

whether the tactics work to prevent terrorism. Even so, people on both sides of the security v.

morality/legality debate make assumptions about the efficacy of various CT measures. Here we

review multiple literatures to assess the efficacy of controversial CT tactics on their own terms,

and evaluate their potential utility within larger state security strategies that depend on intelligence

management, informant-recruiting, and maintenance of state legitimacy. We find good evidence

that controversial CT tactics may have been counterproductive in several ways: increasing the ratio

of informational ‘noise’ to terrorist ‘signal,’ undermining the state’s legitimacy among potential

civilian informants, and legitimizing terrorists’ preferred status as ‘warriors.’ In no case is there

credible evidence showing that these controversial CT measures significantly helped catch terrorists

or offered other strategic advantages outweighing their disadvantages.

Key Findings1. THE MOST EFFECTIVE CT MEASURES ARE ALSO THE LEAST CONTROVERSIAL. Across a range

of government, think tank, and media reports, experts expressed general agreement on

several elements of effective CT strategy, including: denying terrorists safe haven, drying up

their funding channels1, preventing them from accessing weapons of mass destruction,

establishing multiple layers of port and border security, undermining terrorists’ recruiting

messages, and bolstering perceptions of state legitimacy to encourage the cooperation of

bystander communities.

2. WE FOUND NO CREDIBLE EVIDENCE DEMONSTRATING THAT THE USE OF CONTROVERSIAL CT

MEASURES COULD HAVE HELPED PREVENT 9/11. NOR DID WE FIND CREDIBLE EVIDENCE THAT

CONTROVERSIAL CT TACTICS HAVE PLAYED ANY SIGNIFICANT ROLE IN FOILING PLOTS SINCE.

Though some have suggested that post-9/11 CT tactics have aided efforts to thwart terrorist

attacks, all available credible evidence suggests that the foiling of terrorist plots since 9/11 has

owed to the help of citizen informants, foreign intelligence tips, and standard police work —

a conclusion that security officials and other recent analyses affirm (Difo 2010).2

EXECUTIVE SUMMARY

Page 5: COUNTERTERRORISM SINCE 9/11

5

EXECUT IVE SUMMARY

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

3. WE COULD FIND NO CREDIBLE EVIDENCE SUPPORTING CLAIMS OF EFFICACY FOR CONTROVERSIAL

CT TACTICS. After an 18-month investigation and the review of well over 500 Government

Accountability Office and Inspectors General reports, declassified intelligence documents, court

transcripts, testimonials by security agents, and other documents, we could find no evidence

demonstrating the efficacy of controversial CT tactics. Conversations with top national security

and CT experts confirmed the absence of credible evidence. The burden of proving the tactics'

efficacy today lies with those who promote their use.

4. THE EXPANSION OF INVESTIGATIVE AND SURVEILLANCE POWERS AFTER 9/11 APPEARS TO COM-

POUND THE CHALLENGES FACED BY SECURITY AND INTELLIGENCE AGENCIES BY INCREASING THE

AMOUNT OF INFORMATIONAL ‘NOISE’ THEY MUST FILTER OUT TO DETECT TERRORIST ‘SIGNALS.’

Signal detection, not intelligence-gathering, failed in the run-up to 9/11 and in the case of the

would-be Christmas Day bomber. Policies allowing for easy surveillance of people who have lit-

tle reason to be suspected of terrorism have flooded security agencies with informational noise

and generated thousands of false leads that distract them from real threats. These signal

detection failures are reflected in data on the numbers of cases the FBI has recommended for

DOJ prosecution. Despite a several-fold increase in the use of expanded search and surveillance

tools, the FBI is generating far fewer cases for prosecution than they did in 2002 and many

more of them are being declined by the DOJ because they lack evidence of wrongdoing.

5. EVIDENCE SUGGESTS THAT ETHNIC AND RELIGIOUS PROFILING, DIMINISHED DUE PROCESS STAN-

DARDS, AND 'ENHANCED INTERROGATION TECHNIQUES' ALIENATE PEOPLE WHO MIGHT PRODUCE

USEFUL INFORMATION FOR LAW ENFORCEMENT. Countering terrorism requires that the state win

the battle for “hearts and minds” among bystander populations. By treating populations with

suspicion, the state may be discouraging cooperation and even reinforcing terrorist narratives

and recruitment efforts.

6. FOR THE ABOVE REASONS AND OTHERS, CONTROVERSIAL CT TACTICS HAVE BECOME INCREASINGLY

UNPOPULAR WITHIN MILITARY AND SECURITY AGENCIES SINCE 9/11. After using some ethnic

and religious profiling shortly after 9/11, many in the FBI and TSA have come to see that form

of profiling as a potentially dangerous distraction. Military and FBI leaders have condemned

the use of torture, and the CIA has all but renounced enhanced interrogation. Many retired and

active Generals, including Gen. David Petraeus, have declared the detentions at Guantanamo

Bay a security risk to U.S. troops.

Page 6: COUNTERTERRORISM SINCE 9/11

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

In the years since the terrorist attacks of September 11, 2001 there has been great debate among

policymakers and the public over the morality and legality of controversial domestic counterterror-

ism (CT) tactics like ‘enhanced interrogation,’ preventative detention, expanded search and

surveillance powers, ethnic and religious profiling, the collection and mining of domestic data, and

the prosecution of terror suspects in military tribunals. There has been strikingly less discussion over

whether these tactics have succeeded on their own terms to prevent terrorist attacks, disrupt terrorist

networks, deliver better intelligence, or end terrorism campaigns.

Opponents of controversial CT tactics often argue that the legal and moral principles violated by

the tactics are so fundamental to American character that they should be held sacrosanct even in the

face of terrorist threats. Proponents argue that the government should make exceptions to normal

peace-time law and employ controversial CT tactics that uphold a higher morality of saving

American lives. Neither group has seriously or consistently questioned the assumptions underlying

this debate – that controversial CT tactics effectively reduce levels of terrorism. A close examination

of that assumption could dissolve this major front of American political contestation since almost

no public figure would support demonstrably ineffective (or even counterproductive) CT policies.

The implications of CT tactic evaluation, of course, go well beyond American political discourse.

The 21st century appears to be one in which nation-states will continue to be susceptible to the vio-

lent political challenges of small groups of determined militants. If these states do not continually

evaluate their tactics and approaches as they respond to disparate and evolving security challenges,

they diminish their likelihood of success in their efforts to curb future political violence while pro-

moting or maintaining other state objectives.

The paper will unfold in six sections. In Section II, we review the limitations and challenges of past

and present CT evaluation research as we articulate our approach to the task. Finding that tactical

evaluation is meaningful only in relation to some strategy, we outline U.S. CT strategy in Section

III. There, we identify strategic objectives and key operational challenges of CT – including promot-

ing state legitimacy, encouraging cooperative relationships with bystander communities,

undermining terrorists’ narratives, and prioritizing and coordinating intelligence – that can be used

as supplemental criteria for tactical evaluation (in addition to evaluating CT tactics in terms of their

ability to meet their own objectives). Section IV is the heart of the paper, dedicated to the evalua-

tion of controversial CT tactics in terms of the methods and criteria established in Sections II and

III. Section V briefly summarizes and discusses the key findings of Section IV. And finally, Section

VI closes the paper with some recommendations to policymakers and NGOs.

6

INTRODUCTION

Page 7: COUNTERTERRORISM SINCE 9/11

EVALUATIVE METHODS

Evaluations of CT tactics are rare, but some do

exist (For a review see Lum and Kennedy 2006,

or Crenshaw 2009). Their scarcity reflects, in

part, understandable limitations on the scope

or design of previous CT research. Also, the

classification of information potentially relevant

for CT evaluation appears to discourage some

authors from approaching the task. Another

challenge stems from the fact that the criteria

upon which tactics can be evaluated often

depend on shifting CT strategies in which they

are embedded. We address these obstacles to

assessing CT tactics as we describe our

approach to the challenge.

Previous CT EvaluationMost previous counter-terrorism evaluations

have assessed entire national CT policy regimes

without focusing on individual policies or

tactics. By measuring numbers of terrorist

incidents or death tolls before and after the

implementation of a CT policy regime (Hewitt

1984; Department of State 2001-2008; Sheehan

2007), authors have been able to conclude that

states either failed or succeeded in their overall

efforts. However, such methods imply that

CT policy regimes are indivisible in their

composition and coherent in their effects.

The methods fail to tease out which tactics

caused a decrease or increase in terrorist inci-

dents or deaths, and risk suggesting causal

relationships to policymakers and the public

that may not exist.

Other analysts have evaluated CT policy

regimes qualitatively (Charters, 1994; Schmid

and Crelinsten 1993; Wilkinson 2001; Art and

Richardson 2007; Cronin 2009), but still rarely

go into detail about the efficacy of specific tac-

tics. When they do, their accounts are often so

historically embedded that readers may have

difficulty distilling general lessons about when

particular CT tactics might be useful or not.

Qualitative researchers’ conclusions, too (like

those of their counterparts employing more sta-

tistical approaches), tend to focus much more

attention on broad CT strategies or policy

regimes than on individual tactics.

Researchers’ focus on the evaluation of CT

strategy is not inappropriate. CT research is still

an emerging field and a case can be made that

questions bearing on strategy often deserve

logical priority to those evaluating tactics.

In fact, we employ a method of tactical evalua-

tion that takes strategic considerations into

account. But, we think focusing on strategic

questions to the exclusion of tactical evaluation

can fail to uncover those tactics that may actu-

ally be ineffective or even counterproductive for

an overarching CT approach.

Our ApproachCT policies and tactics can and should be eval-

uated individually so that counter-terrorism can

continually improve in response to evolving ter-

rorist threats. Our method for evaluating CT

tactics is two-fold. First, we ask if the CT tactic

achieves its particular aim. Second, we ask if

7

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Page 8: COUNTERTERRORISM SINCE 9/11

8

ondary to some CT strategies, are important for

the current U.S. strategy against Al Qaeda and

its affiliates and allies who continue to target

U.S. interests. We note, therefore, that this

paper, while its conclusions may be broadly

applicable to many CT campaigns, is specifi-

cally geared for evaluating CT tactics employed

by the U.S. against militant irhabis3 who target

the West.

In Section III we briefly outline the develop-

ment and basic shape of U.S. CT strategy and

provide further rationale for evaluating CT

tactics by the criteria we have listed above.

While we do not offer a detailed threat assess-

ment and evaluation of counterterrorism

practices (available in a forthcoming docu-

ment), we briefly describe in this section the

evolution of U.S. CT efforts from the pre-9/11

period through today and highlight elements

of those efforts with which effective CT tactics

should be compatible.

Our main analyses in Section IV pull together

the work of many scholars, journalists,

archivists, historians, think-tank analysts, and

government-commissioned investigators. While

this paper has been motivated by the relative

dearth of reports carefully evaluating CT

tactics’ efficacy – and, as far as we are aware,

the nonexistence of a single document compil-

ing those evaluations and placing them in

productive dialogue with other security

literatures – we have drawn heavily from the

few documents that do assess CT tactics.

EVALUAT IVE METHODS

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

the CT tactic has secondary consequences for

broader CT efforts.

In the first step, we simply ask, for instance,

whether expanding investigators’ search, sur-

veillance, or seizure powers after 9/11 has

actually allowed law enforcement and intelli-

gence agents to more easily capture terrorist

plotters. We have been able to answer this

question – and others like it – by referring to

the explicit or implicit intentions of the CT

tactic and comparing those to the effects of its

implementation as reflected in various reports

describing what CT tools have been vital in

foiling terrorists’ efforts. We also often employ

a counterfactual analysis to the events of

September 11th, asking: ‘If CT tactic X had

been used prior to 9/11 would the attacks have

been prevented?’

The second step in our evaluative approach asks

whether CT tactics (whether or not they accom-

plish their stated objectives) have secondary

consequences for broader CT efforts. We pay

particular attention to how the tactics overcome

or exacerbate the key challenges of U.S. coun-

terterrorism – gathering useful information,

prioritizing and coordinating intelligence,

promoting state legitimacy, encouraging com-

munity-generated tips and the support of

bystanders, and undermining terrorists’ narra-

tives. Some of these operational imperatives –

like intelligence gathering, prioritizing, and

coordinating – are common to virtually all CT

campaigns. The others, while potentially sec-

Page 9: COUNTERTERRORISM SINCE 9/11

9

Among them are evaluations of the efficacy

of enhanced interrogation (see Rejali 2009;

Fein et al. 2006; Rumney 2005-2006), civilian

vs. military trials for terrorism suspects

(Greenberg et al 2010; Zabel 2009; Gude 2010),

airport screening relying on ethnic profiling

(Chakrabati and Strauss 2002; Press 2009;

Sandomir 2009), and data-mining techniques

(National Research Council 2008; Jonas and

Harper 2006). We review these documents

along with related government documents,

news accounts, suspect interviews, indictments,

Congressional testimony, and journalistic

investigations about terrorist plots and efforts

to disrupt them.

We also draw on history and the social sciences

to evaluate CT efficacy in a wider context.

So, for example, in considering the effects of

expanded surveillance activities since 9/11,

we employ ‘signal detection theory’ to evaluate

whether increasing informational ‘noise’ has

reduced detection of the terrorist ‘signal’. We

draw on psychological research into human

motivation to explore how coercive interroga-

tion might exacerbate unproductive adversarial

relationships between interrogators and their

subjects. In weighing the efficacy of detention

policies, we consider their impact on percep-

tions of state legitimacy in communities whose

cooperation may be vital to CT efforts. We

consider the results of mathematical models

of social learning for evaluating the efficacy

of airport profiling policies over time. And we

consider how sociological theories of labeling

and deviance may predict that terrorists would

prefer to be tried (or even plead guilty) in mili-

tary tribunals.

While CT is often imagined as a shadowy,

secretive enterprise, much of how CT functions

is known through years of court cases, news

coverage, congressional testimony, books by

high-ranking government security figures,

investigative journalism, extensive leaks and

declassifications, and countless government

oversight reports. These sources constitute a

robust body of publicly available information

describing the uses and outcomes of the CT

tactics we evaluate in this report.

A final important challenge to evaluating CT

tactics is the fact that interpreting their effects

depends, at least in part, on the broader strategy

they are meant to advance. We now turn to a

discussion of that CT strategy and the primary

challenges to its implementation in order to

identify and clarify contextual criteria by which

we evaluate CT tactics’ efficacy.

EVALUAT IVE METHODS

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Page 10: COUNTERTERRORISM SINCE 9/11

10

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

Because CT tactics impact broader CT strategy,

their efficacy cannot be evaluated only in terms

of their intended objectives. A tactic that effec-

tively meets its own objectives (e.g. destroying a

terrorist safehouse) could nonetheless be harm-

ful to CT strategy if it excludes the use of some

other tactic better able to advance strategic aims

(e.g. surveilling the safehouse and its members

to learn more about their network and their

upcoming operations). And because the imple-

mentation of any strategy is challenged at the

level of operations (between high-level strategy

and its on-the-ground tactical implementation),

tactics must also be evaluated for their role

in overcoming or exacerbating key operational

challenges. In counterterrorism campaigns –

because terrorists act covertly– a key opera-

tional challenge involves managing information

about terrorists’ movements and plans. Below,

we briefly outline U.S. CT strategy and explore

its operational challenges.

The Evolution of U.S. CT StrategyThe counterterrorism strategy of the United

States has evolved throughout the latter half

of the 20th century. In the 1960s, extremist

Islamist terrorist acts rarely affected Americans

directly. When they did, death tolls were

small and the historical, policy, and political

consequences were usually slight. Presidents

were even routinely advised to avoid engaging

directly in CT decisions since “there was little

the U.S. government could do to prevent […]

attacks, and it would be better to shield

the White House from future blame” (Naftali

2005, 45).

By the 1970s and ‘80s, however, threats from

terrorists at home and abroad had inspired the

development of CT working groups and task

forces in several bureaus of government.4 While

U.S. Presidents and Congress dedicated consid-

erable resources to uncovering and stopping

amateur militants, they also hewed closely to a

strategy of denying terrorist the attention they

needed to grow their movements (See Naftali

2005, Chapters 2 and 4). Historical precedent

had also suggested that states too eager to fight

terrorists often ceded legitimacy to militant

groups by becoming too brutal, or too repres-

sive (e.g. Argentina, Columbia). Overzealous

security measures could actually drive some

populations into terrorists’ hands. As long as

the state’s moderate course (based mostly in law

enforcement techniques) did not undermine cit-

izens’ trust in its ability to keep them safe, it did

not appear useful to act in dramatic fashion.

To many, the events of 9/11 seemed to repudi-

ate a strategy based on starving terrorists of the

attention they sought. There was no ignoring

or downplaying the atrocities. The state’s

legitimacy and reputation as a protector of its

population had been frontally attacked.

Within days, nearly every commentator inside

and outside U.S. security establishments

declared that Al Qaeda must be denied a safe

haven from which it could plot, train for, and

TACTICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTERTERRORISM

Page 11: COUNTERTERRORISM SINCE 9/11

11

TACT ICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTER TERROR ISM

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

material to execute a nuclear attack (Mueller

and Center 2008; Bergen and Hoffman 2010).

Overlapping U.N. and international initiatives

have also focused on reducing chemical and

biological weapons proliferation by tracking

and regulating the international sale of danger-

ous materials. Together, these initiatives have

sought to reduce the threat of mass-casualty ter-

rorism without requiring states to protect all

potential targets at all times.6

In addition to working to secure the materials

of terrorism at their source, the U.S. has also

raised security levels at its borders and other

points of entry into the country. The formaliza-

tion of airport screening by the Transportation

Security Agency (TSA) raised barriers to more

weapons and explosives. And recent improve-

ments to the passenger pre-screening system

(discussed more thoroughly below) demonstrate

its continual (if sometimes lagging) evolution

with the terrorist threat. Despite popular

criticism that the U.S. screens too few of the

containers entering its ports, the Container

Security Initiative of the Department of

Homeland Security has also secured interna-

tional cooperation with ports around the world

to increase screening of nearly 86% of the

cargo that eventually enters the U.S. (Deflem

2010, 51). Other agencies, like the Bureau of

Immigration and Customs Enforcement and

Customs and Border Protection round out a

multi-layered defense of American borders that

includes the securing of trade routes abroad

and ports of entry at home (Ibid.).

carry out future offensives. Weeks later, with

widespread international support, the U.S. led

an air and ground campaign into Afghanistan

to root out Al Qaeda and their Taliban hosts.

Though coalition forces were not able to cap-

ture Al Qaeda and Taliban leadership who

crossed into Pakistan, they destroyed much of

the middle tier of Al Qaeda’s central organiza-

tion, crippling the group and successfully

denying it uncontested safe haven.

Security experts also agreed that terrorism

could be combated by denying violent groups

the resources they need to be successful. Taking

advantage of an international mood favoring

cooperation, the U.S. led global efforts to secure

and monitor money and weapons that could

be used by violent anti-government groups.

The Department of the Treasury partnered with

Belgium’s Society for Worldwide Interbank

Financial Telecommunication (SWIFT) to track

and disrupt a significant portion of Al Qaeda’s

funding network5. And recent reports suggest

that Al Qaeda’s Afghanistan/Pakistan organi-

zation is experiencing financial difficulties

(Levitt 2008, 8; Asharq Al-Awsat 2010).

The existence of an apparently robust network

of sophisticated terrorists amplified unrealized

fears of nuclear terrorism that had circulated

since the 1950s. In response, international part-

nerships to track and secure nuclear weapons

accelerated starting in late 2001 and, by many

accounts, have helped reduce the already low

probability that terrorists could access enough

Page 12: COUNTERTERRORISM SINCE 9/11

12

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

President Bush and Congress also followed a

policy consensus arrived at by two blue ribbon

panels from the previous administration,

creating a Department of Homeland Security

(DHS) and passing legislation updating the

information-sharing practices of the intelligence

agencies.7 Recent reports, especially in the

Washington Post, suggest that efforts to

coordinate intelligence sharing – a key recom-

mendation of the 9/11 Commission – have

not proceeded as quickly or effectively as

planned. Although efficient information sharing

appears to depend as much on institutional

culture as design,8 organizational changes have

begun to increase the intelligence community’s

capacity to link information from multiple

sources and agencies.

In keeping with a theme that restrained

responses to terrorism had weakened the

United States, President Bush and Congress

also responded with policies seeking to give

federal investigators and intelligence agencies

expanded tools with which to do their work.

Some PATRIOT Act provisions made it easier

for federal investigators to surveil people, or

search or seize their property. While the 14th

amendment made it illegal for the government

to single out American citizens for investigation

based on their race, ethnicity, or religion, the

FBI and Immigration officials pushed against

this boundary with “voluntary” interviews

of Muslim and Arab americans and the

targeted “Special Registration” of Muslim

and Arab immigrants. The Department of

Justice also selectively detained or deported

over 700 Arab and South Asian men - many

students - for minor visa violations that typi-

cally would not have been enforced.

Though the U.S. had claimed a tradition

against domestic spying for most of its history,

President Bush signed a secret executive order

allowing the National Security Agency (NSA)

to intercept Americans’ telephonic and elec-

tronic communications to and from foreign

sources. The President also detained several

hundred men on or near the battlefields of the

“War on Terror,” foreclosed their rights to

habeas corpus petitions – disallowing them due

process rights for their self-defense in a court of

law – and created military tribun in which they

could be convicted by evidence inadmissible in

traditional criminal courts. The President, CIA,

and Department of Justice (DOJ) also worked

together to formalize a regime of physically and

psychologically coercive interrogation proce-

dures in the hope that the tools could elicit

more information from terrorists than conven-

tional interrogation techniques. The

Department of Defense (DOD) simultaneously

outlined its own set of coercive detention and

interrogation practices.

Unlike the creation of multi-layered defenses

and even the invasion of Afghanistan (which

enjoyed widespread global support), these U.S.

expansions of police and intelligence agencies’

powers contravened the older counterterrorist

wisdom that state action should preserve its

TACT ICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTER TERROR ISM

Page 13: COUNTERTERRORISM SINCE 9/11

13

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

own legitimacy and deny terrorists rhetorical

ammunition with which to recruit followers.

But in the aftermath of the horrors of

September 2001, and amid the ongoing fears

that other attacks may be coming, such

wisdom was cast aside in favor of more

aggressive tactics.

The Emerging Counterterrorism StrategyOver time, increasing numbers of CT

researchers and strategists have come to articu-

late an approach to CT that combines some

elements of past strategies while also emphasiz-

ing the importance of winning the “hearts and

minds” of populations that terrorists would like

to recruit to their cause. Such rethinking has

often come from individuals within the

traditional security apparatus including from

General David Petraeus, General Stanley

McChrystal, General Sir Rupert Smith (UK),

Mike German (former FBI), Tom Parker

(former MI-5), Stephen Kleinmann (Air Force

reserve Colonel and former interrogator),

Matthew Alexander (former Air Force inter-

rogator in Iraq), and many more. Though U.S.

CT strategy has shifted within the last decades,

the current approach is based on the following

objectives:

¢ Deny terrorists safe haven by conducting

offensive military operations.

¢ Deny terrorists access to financial networks.

¢ Deny terrorists access to weapons of mass

destruction (WMDs) or the materials for

their production.

¢ Establish multiple layers of security

screening for people and objects entering

the country.

¢ Undermine terrorists’ recruitment

capability.

¢ Enhance perceptions of state legitimacy

among the very people terrorists would

like to recruit to their cause and win their

loyalty by:

¢ Providing these communities with

direct aid or protection.

¢ Building cooperative relationships

with them.

¢ Avoiding unnecessary casualties,

abuse, or intimidation.

¢ Encourage these same communities to

disavow and expose terrorists who may

be in their midst.

Efforts to win the support of bystanders to

terrorism and counterterrorism (bullet points

six and seven) have become more prominent

elements of U.S. CT strategy in the years

since abuses at Abu Ghraib, Bagram, and

Guantanamo prisons inflamed an anti-U.S.

backlash among many Muslims (See Sheehan

2009 for a quantitative analysis of this back-

lash). Several works of CT scholarship (an

increasingly popular field of interdisciplinary

study) have also contributed to this shift in

strategic emphasis. Canvassing the history

of state clashes with terrorists, various authors

have found that approaches which abuse or

TACT ICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTER TERROR ISM

Page 14: COUNTERTERRORISM SINCE 9/11

14

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

repress bystander populations rarely speed the

end of terrorism campaigns and often prolong

them by transferring legitimacy from states

to terrorist groups (Hewitt 1984; Art and

Richardson 2007; Schmid and Crelinsten 1993;

Charters, 1994; Wilkinson 2001; Sheehan 2009;

Cronin 2009).

Emerging CT thought increasingly stresses the

importance of state legitimacy for CT strategy.

Establishing, maintaining and enhancing the

legitimacy of CT operations encourages reliable

reporting from communities in which terrorists

might be embedded, undermines terrorist narra-

tives charging the state with hypocrisy, and

inspires cooperation from international allies.

Legitimacy is thus seen as critical to the secu-

rity of the nation state at home and abroad.

In many ways, the newfound emphasis on

legitimacy reflects the state’s relearning of its

basic nature. Max Weber defined the state as

“a human community that (successfully) claims

a monopoly on the legitimate use of physical force

within a given territory” (italics in the original;

Weber 1946, 78). While this quote has some-

times been reduced to the state having the

“monopoly on violence,” Weber emphasizes

its “legitimate use.”

A state that uses force illegitimately — arbitrar-

ily, selectively, or for personal rather than public

interests — may undermine the basis of its

power as much as a state that fails to use force

to defend itself and its citizens against external

or internal aggressors. In the case of CT, states

that use force illegitimately risk alienating

potential citizen informants who are often criti-

cal to disrupting terrorist plots and networks.

Citizen informants provided intelligence that

helped foil many plots including those of the

Lackawanna Six in 2002, The Portland Seven

in 2003, James Elshafay and Shahawar Siraj

in 2004, Michael Reynolds in 2005, and Faisal

Shahzad in 2010 (Difo 2010).

As we evaluate CT tactics below, we will fre-

quently use elements of current U.S. CT

strategy as criteria to judge the efficacy of the

tactics. If a tactic is successful in some regard

but harms CT strategy overall – for instance,

if it is perceived as abusive or illegitimate and

causes people to think twice about reporting

a relative, friend, or neighbor engaged in

terrorist activities – its overall efficacy may be

questionable. Before we move to those tactical

evaluations, though, we must consider how

some tactics might alleviate or exacerbate

perennial obstacles to CT efforts.

Operational Challenges to CT: Sorting Information,Coordinating IntelligenceEven the best conceived strategies may falter if

their implementation is impractical at the oper-

ational level. In the case of CT, the success of

any strategy meant to root out covert militant

groups will depend heavily on the availability

and quality of intelligence about their where-

abouts and plans. Unfortunately, the quality of

TACT ICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTER TERROR ISM

Page 15: COUNTERTERRORISM SINCE 9/11

15

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

intelligence – its relevance to other information,

truth-value, and urgency – is often not evident

at the time it is received. A detainee’s report

of an impending attack could be lifesaving

information, but it could also be a prideful

bluff or an intentional misdirection intended

to divert intelligence agents’ time and resources.

Thus, a key challenge, or perhaps the key chal-

lenge, to CT operations is the analysis, sorting,

and prioritization of information of unknown

relevance for defeating terrorists. In the lan-

guage of ‘signal detection theory’ this is the

challenge of identifying a relevant ‘signal’ in the

midst of informational ‘noise’ (McNicol 2004).

Often, the relevance of incoming information

cannot be determined without reference to

information that is housed at some other U.S.

intelligence agency. The 9/11 Commission

highlighted this as a major impediment to pre-

venting the attacks of September 11th. They

concluded that the major failures leading up

to the attack stemmed most directly from poor

information coordination among the U.S.’s fif-

teen separate intelligence agencies and a failure

to imagine and prepare for unseen terrorist

tactics like the hijacking and weaponization

of airliners (Kean et al 2004, Chapter 11).

The commission made multiple recommenda-

tions, many of which were taken up by the

Bush Administration and have already been

discussed (Ibid., Chapter 12), but their most

urgent was the restructuring and streamlining

of the intelligence community. Though some

positive steps have been made in this direction,

a recent week-long Washington Post expose

of the U.S. intelligence community, “Top Secret

America,” paints a dismal picture of the pro-

gress (Priest and Arkin 2010).

Given the dependence of CT operations on

accurate intelligence that must be sorted and

prioritized by a limited number of human

analysts, and the poor state of intelligence coor-

dination in the U.S., any CT tactic exacerbating

the challenges of the intelligence community

should be regarded with suspicion by policy-

makers and the public. Intelligence agencies

are flooded with information to analyze –

the vast majority of it just informational white

noise. If some CT tactics are increasing the

volume of this noise or decreasing the volume

of terrorist signals, they may be more harmful

than helpful to U.S. CT missions.

TACT ICS IN CONTEXT: THE STRATEGY AND CHALLENGES OF COUNTER TERROR ISM

Page 16: COUNTERTERRORISM SINCE 9/11

16

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

EVALUATING CONTROVERSIAL COUNTERTERRORISM TACTICS

Below, we evaluate the efficacy of several

CT tactics. A tactic can be deemed effective if

it accomplishes its intended goals, aides a CT

strategy based in part on boosting the legiti-

macy of the U.S. relative to terrorists in the eyes

of bystander populations (outlined on page 11),

and does not exacerbate the intelligence chal-

lenges inherent to CT efforts.

Expanded Surveillance and Search ToolsWithin five weeks of the 9/11 terrorist attacks

Congress passed, and President Bush signed,

sweeping CT legislation known as the USA

PATRIOT Act (an acronym formed from the

bill’s official title: Uniting and Strengthening

America by Providing Appropriate Tools

Required to Intercept and Obstruct Terrorism).

Most of the provisions of the Act, and

some accompanying revisions to the Foreign

Intelligence Surveillance Act (FISA), are

considered uncontroversial, even among civil

liberties advocates. However, the act’s

expansion of some surveillance tools and the

lowering (or elimination) of the evidentiary

thresholds investigators must meet to surveil,

search, or seize the property of Americans have

been highly controversial since 9/11, inspiring

political, judicial, and legislative contests over

their constitutionality.

But questions of the expanded search and sur-

veillance powers’ efficacy should be of greatest

relevance to policymakers, security agencies,

civil liberties advocates, and the public. Has the

eased usage of National Security Letter (NSL),

roving wiretaps, “sneak and peek” searches,

suspicious activity reports (SARs), and FISA

surveillances helped law enforcement get infor-

mation critical to CT operations that they could

not have obtained using pre-9/11 standards and

procedures? Have these loosened standards gen-

erated unintended consequences that were

either productive or counterproductive to CT

operations? Here we review the historical role

of surveillance and judicial oversight, examine

the available evidence for and against the effi-

cacy of controversial PATRIOT Act and FISA

provisions, and consider the implications of

signal detection theory for expanded search and

surveillance tools.

1 . P L O T D E T E C T I O N

We begin our evaluation of the efficacy of

expanded search and surveillance tools with

an investigation into their ability to aide in the

detection and foiling of terrorist activities.

Since these PATRIOT Act provisions and FISA

revisions were passed ostensibly in response

to 9/11, we first ask whether they would have

helped prevent those attacks in particular.

In our review of news articles and intelligence

reports we found no credible evidence suggest-

ing that these provisions would have prevented

9/11 or even resulted in better intelligence

about the plot. The 9/11 Commission Report

blamed a range of factors for the attacks —

lack of imagination, lack of understanding

the danger, lack of information sharing, and

Page 17: COUNTERTERRORISM SINCE 9/11

17

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

either. According to our analyses of news

accounts, FBI investigation reports, and recent

studies on foiled terrorist plots, all were broken

open due to the combination of well-deployed

undercover agents, information from citizen or

undercover informants, and tips from foreign

intelligence agencies (Difo 2010).10 Search and

surveillance warrants, whose usage was eased

by the PATRIOT Act, are only known to have

been used in two cases (those of the Portland

Seven, and Najibullah Zazi11). However, time-

lines of the investigations suggest that the

warrants investigators sought and attained

would have been authorized under pre-

PATRIOT standards. The Portland Seven had

startled a local citizen with their recreational

gun use, and the FBI used an undercover

informant to discover their interest in domestic

attacks. Based on that information, the FBI

attained surveillance warrants they would have

been able to attain even before the passage of

the PATRIOT Act.

In Najibullah Zazi’s case, too, investigators did

not need the PATRIOT Act to carry out their

investigations. Their surveillance of Zazi started

based on Pakistani intelligence reports that he

had visited with Al Qaeda operatives during his

trip to Peshawar, Pakistan in 2008 (Temple

Raston 2010) .That evidence would have been

sufficient for the FISA warrants they subse-

quently used to surveil him, with or without the

PATRIOT Act or post-9/11 amendments to

FISA. Similarly, the Joint Terrorism Task

Force’s ‘delayed notification’ or “sneek and

others — none of which included the idea that

excessively high warrant standards had blocked

the ability of the FBI or other agencies to

receive a search or surveillance warrant.9 The

Commission’s report listed ten “Operational

Opportunities” the intelligence agencies missed,

from the CIA’s failure to put Khalid al Mihdhar

on a watchlist in January 2000, to the FBI

Headquarter’s failure to act on urgent warnings

about Zacarias Moussaoui raised by the

Minneapolis FBI’s offices (Kean et al 2004,

355-6). In the case of the latter, FBI HQ refused

requests from the Minneapolis FBI field office

to seek a warrant from the Justice Department

for the search of Moussaoui’s computer

because it did not identify French intelligence,

suspicious flight school attendance, and other

evidence as a malicious pattern.

The preponderance of evidence suggests

that the greatest barrier to more effective

CT remains the operational challenges to

intelligence sharing, analysis, and “connecting

the dots” (what the 9/11 Commission called

“institutional imagination”). Thus, the 9/11

Commission recommended reorganizing and

centralizing the government’s fifteen or more

different intelligence agencies to promote

institutional imagination and efficacy, but

made no recommendation to expand search

or surveillance tools (Ibid. Chapter 12).

Furthermore, our investigation into plots foiled

since 9/11 uncovers no credible evidence that

the expansion of search and surveillance tools

resulted in the discovery of those activities

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 18: COUNTERTERRORISM SINCE 9/11

18

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

peek” search of his rental car would have been

permitted according to case law developed in

the 2nd and 9th Federal Circuits well before the

PATRIOT Act was even imagined.12 As Sam

Rascoff, former NYPD intelligence officer, put

it, “what’s striking about the Zazi case is not so

much that new tools were being used, but that

old tools were being used in a comprehensive

fashion, and that they were being stitched

together in a thoughtful, strategic way, so

that one tool naturally gave way to another”

(Temple Raston 2010).

Since 9/11, even as CT agents and agencies

have become more adept in their use of classic

investigatory tactics and more attuned to

patterns of suspicious behavior, they have still

failed to piece together clues in important cases.

But these failures have not been due to hurdles

posed by judicial oversight or excessively-high

warrant standards. British and U.S. intelligence

agencies who were tracking Nigerian national

Umar Farouk Abdulmutallab before he

attempted a jet plane bombing on Christmas

Day, 2009 were not impeded by high warrant

standards nor did they need PATRIOT Act

provisions to discover through an informant

(i.e., Abdulmutallab’s father) that he might be

involved in a terrorist plot. In Abdulmutallab’s

case, as with 9/11, intelligence officials simply

failed to put together various clues including

communications with American provocateur

Anwar al-Awlaki, a prior warning to the U.S.

embassy by Abdulmutallab’s father, and

intercepted Al Qaeda communications that a

Nigerian would be involved in a future attack.

2 . D ATA M I N I N G

Three weeks after the 9/11 attacks, as it became

apparent that many of the hijackers had lived

and trained in the United States, President

Bush signed an Executive Order making it

easier for the National Security Agency (NSA)

to listen in on communications between

U.S. citizens and foreign callers whom the NSA

“reasonably suspected” of terrorist involve-

ment. And, the executive order allowed

the NSA to operate these wiretaps without

warrants or judicial oversight (i.e. from Federal

Intelligence Surveillance Courts, FISCs).

The NSA had been fairly successful intercepting

the signals of known U.S. enemies during the

Cold War. Now it was being asked to identify

America's enemies among the billions of people

in and out of the U.S.

But this NSA-led “President’s Surveillance

Program” (PSP) met with significant chal-

lenges. First among them was the difficulty of

managing and sifting through the giant masses

of information (Bamford 2008). In response,

the NSA developed computer algorithms

to query data for transactions (e.g., fertilizer

purchases) and communications (e.g., with

Pakistanis) that set off “red flags” as defined by

human analysts. Emails containing suspicious

words and phrases like “bomb” and “conven-

tion center” might trigger a red flag. If enough

red flags were associated with a single person,

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 19: COUNTERTERRORISM SINCE 9/11

19

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

the NSA might single that individual out for

additional surveillance by human analysts.

All of this meant that the PSP’s information

trawling could only work if terrorists

communicated about their plans on the phone

or through email using very literal language.

But, as anyone who has ever discussed

a surprise party within earshot of the guest

of honor can attest, it is easy for callers to

substitute unrelated verbs and nouns for those

that might reveal their plot. Human languages

are famously subtle and labile when secrecy

is a factor in communication.

An evaluation of the PSP conducted by the

Offices of Inspector General (OIG) for the

Department of Defense (DOD), DOJ, CIA

and the Office of the Director of National

Intelligence (ODNI) is damning in its faint

praise of the program. Unable to cull together

hard evidence of the program’s efficacy, the

Inspector General’s report relied most heavily

on the testimony of intelligence officials and

analysts. According to the report: “NCTC

[National Counterterrorism Center] analysts

and ODNI personnel described the PSP infor-

mation as ‘one tool in the tool box’ or used

equivalent descriptions to explain their view

that the PSP information was not of greater

value than other sources of intelligence”

(Department of Defense et al 2009). “In sum,

the DOJ OIG found it difficult to assess or

quantify the overall effectiveness of the PSP

program as it relates to the FBI’s counterterror-

ism activities. However, based on the interviews

conducted and documents reviewed, the DOJ

OIG concluded that although PSP-derived

information had value in some counterterror-

ism investigations, it generally played a limited

role in the FBI’s overall counterterrorism

efforts” (Ibid.). The bias of interviewees,

though, may have contributed to suggestions

that the program was worth continuing despite

its undemonstrated value. FBI Director Robert

Mueller stated, for instance, “that he ‘would not

dismiss the potency of a program based on the

percentage of hits’” (Ibid.).

If the PSP was less effective than its proponents

hoped, other NSA programs seeking to predict

terror attacks faced more fundamental chal-

lenges. In a world where private firms were

collecting massive amounts of financial, tele-

phonic, and electronic transactional data, NSA

leadership and their funders in Congress sought

to use computers and algorithms to seek pat-

terns of terrorist behavior within those data.

The agency went to work compiling and index-

ing massive databases of existing intelligence

case files, financial institutions’ records of their

clients’ transactions, and telecommunications

companies’ records of clients’ phone calls,

emails, website visits, and text messages.

They installed splitters at fiber optic connection

points, effectively siphoning a mirror image

copy of all telephonic and electronic communi-

cations for further analysis and sorting

(Bamford 2008).

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 20: COUNTERTERRORISM SINCE 9/11

20

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

But, NSA efforts to pick out potential terrorists

using sophisticated data-mining techniques

were severely limited by the fact that there are

too few terrorist plots and associated behaviors

to identify a general pattern

of (electronic, transactional) ‘terrorist’ behavior.

The ‘machine learning’ that can make data-

mining effective in domains like credit scoring

requires vast stores of data on individual finan-

cial activity.

Machine learning works by comparing data on

a subject’s current financial history to the com-

plete history of many people who were

similarly situated at some point in their past.

Because the computer knows with certainty

how several people in socioeconomic situation

‘x’ performed financially at time t1, t2, t3, …

t99, it can later predict how a person in situa-

tion ‘x’ at time t32 will behave. However, for

the machine to learn what set of socioeconomic

variables actually predicts future behavior –

i.e. what ‘similarly situated’ means – it must

have a complete and thorough ‘training set’

of data on a number of people covering a wide

array of variables at least somewhat relevant to

their financial performance (National Research

Council 2008).

Because banks have kept so much data on their

customers’ transactional histories and those

data are easily linked to other data – e.g. home

ownership, occupation, number of children,

age, education, ethnicity, gender, etc. - the

‘training sets’ for financial competence are com-

prehensive in terms of variables, complete over

the financial lives of subjects, and relatively

accurate. As banks continue to accrue more

data, the software learns more and more about

how its predictions were right or wrong and

becomes even better at predicting financial out-

comes in the future.

When applied to the case of terrorism, the NSA

had hoped data-mining software relying on

machine learning would be able to predict who

will engage in terrorist activity weeks, months,

or even years before their attacks are scheduled.

But there simply are not enough data on terror-

ist activities to use the machine learning process

(Ibid.). Comprehensive data sets on terrorists’

activities prior to attacks only number in the

dozens. Programmers would need several hun-

dred cases, at minimum, for the machine

learning process to be helpful.

But even these data are not likely to be helpful.

More data about terrorist behaviors could be

added as plots unfold but there is little reason

to believe that terrorists openly engage in meas-

urable behaviors that are both substantially

related to terrorist activity (that could be used

to establish a terrorist ‘signal’) and are clearly

distinguishable from the common behaviors

(i.e. irrelevant informational ‘noise’) of billions

of non-terrorists. Before the 9/11 attacks, the

activities of the hijackers — renting apartments,

holding jobs, carrying passports, and buying car

insurance in their own names — all appeared

normal. Their phone numbers were in the local

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 21: COUNTERTERRORISM SINCE 9/11

21

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

phone book. Some of them even bought their

boxcutters at a Target store just down the street

from NSA headquarters. Even after 9/11, none

of these activities would seem suspicious. And

the most suspicious behavior — inquiring about

how to fly but not land passenger jet planes —

could only be noticed by human informants or

agents, not computers sifting through petabytes

of transactional data.

3 . FA L S E L E A D S

While unnecessary informational noise poses

a challenge to the detection of genuine terrorist

signals, false signals actually distract attention

and resources away from helpful CT efforts.

To prevent the pursuit of false leads, states –

for centuries – have regulated the ability

of law enforcement to conduct searches and

surveillance.13 If evidentiary thresholds for

attaining investigative warrants are set too low

(or eliminated entirely), agents may, intention-

ally or not, pursue more weak leads than they

would with stricter oversight. Expansive inves-

tigative powers threaten security and undermine

state legitimacy if they distract the attention

and resources of security agencies, encourage

the harassment of innocents, or allow the

guilty to go free.

Our review of news accounts and government

reports has uncovered evidence that expanded

search and surveillance tools after 9/11

increased informational noise and the pursuit

of false signals. PATRIOT ACT provisions

allowed the FBI to collect more and more

information about people without demonstrat-

ing sufficient (or in many cases, any) cause for

suspicion. Between the years 2000 and 2008,

the issuance of National Security Letters

(NSLs) — demands sent to companies to

secretly gather financial and communications

transactional information about individuals

without their knowledge — increased over five-

fold to 50,000 per year (Dept. of Justice 2007).14

The number of FISA warrants sought and

approved also doubled over the period to 2,400

(Electronic Privacy Info. Center 2008). And, the

number of Suspicious Activity Reports (SARs),

which are secret reports to the Treasury

Department made by U.S. banks about their

customers, grew six-fold to 1,250,000 by 2007

(Dep. of Treasury 2008). (Meanwhile, the

number of FBI agents working on terrorism

only doubled.)

With so much information being collected, one

might think that the number of terrorism cases

also increased dramatically over the period.

However, the number of cases prosecuted by

the DOJ dropped significantly from its post-

9/11 high of 355 in 2002, to 34 in 2008 (the

latest year for which data were available at the

time of printing). Those numbers may reflect

prosecutorial overzealousness in 2002 and/or

a steady decline in the number of individuals

engaged in terrorist activity over the period.

In any case, the enhanced information gather-

ing powers of the FBI did not seem to result

in higher quality case files for prosecution.

While in 2001, DOJ prosecutors declined only

33 percent of the terrorism cases the FBI

referred for prosecution, in 2002 that declina-

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 22: COUNTERTERRORISM SINCE 9/11

22

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

tion percentage rose to 54%. By 2006, the DOJ

rejected 87% of the terrorism cases the FBI

referred for prosecution (Transactional Records

Access Clearinghouse 2006).

These data plainly show that at the same time

investigators were collecting more information

they were also referring fewer cases to prosecu-

tors overall, and a much higher percentage of

those did not meet prosecutors’ standards.

While the Justice Department defends the use

of its expanded search and surveillance powers,

its Inspector General’s Office has also reported

on their limited effectiveness: “Many field

agents and Headquarters officials we inter-

viewed said it is difficult to isolate the

effectiveness of national security letters in the

context of a particular case” (Fine 2007-A, 45).

Indeed, responding to an earlier journalistic

investigation by Washington Post reporter Barton

Gellman, then Assistant FBI-Director, Michael

Mason could not recall a case in which NSLs

had been essential or dispositive. “I’d love to

have a made-for-Hollywood story, but I don’t

have one,” Mason said. “I am not even sure

such an example exists” (Gellman 2005).

The same can be said for controversial Section

215 of the PATRIOT Act, which expanded the

scope of FISA search warrants to “any given

thing” associated with a FISA investigation.

When Section 215 was reviewed by the DOJ

Inspector General, his report concluded, “We

found no instance where the information

obtained from a Section 215 order resulted in a

major case development such as the disruption

of a terrorist plot” (Fine 2007-B, 79). “Most

of the agents we interviewed said the records

obtained… did not contribute to the develop-

ment of additional investigative information”

but were useful for ruling out suspicions about

a person (Fine 2007-B, 67).

Some policymakers thought that lowering

evidentiary thresholds justifying search and

surveillance would free terrorism investigators

from wasting precious time seeking what they

judged to be excessive permission from judicial

authorities, arguing that in situations where

time is of the essence, judicial oversight could

put security at risk. But long before 9/11,

agents could request and receive warrants very

rapidly — within hours, not days — if they had

evidence suggesting that someone might be

involved in criminal activity. In emergency

situations, investigators could even set a wiretap

and then apply for its warrant later. In non-

emergency situations judicial oversight often

improves intelligence gathering by requiring

careful investigative work critical to winning

warrants and prosecuting cases. Contrary to the

conventional understanding that investigatory

oversight slows investigators, appropriate

judicial oversight reduces the distracting noise

of false leads, saves investigators the time

needed to rule out the guilt of thousands of

potential ‘suspects,’ and improves the quality

of intelligence.

The argument could be made that it is not pos-

sible to know the effects of expanded search

and surveillance tools because the valuable

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 23: COUNTERTERRORISM SINCE 9/11

23

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

intelligence and investigatory contributions

resulting from reduced standards are classified.

But if this argument were true, then only a

remarkable and highly improbable coincidence

(or some far-fetched conspiracy) could explain

how all available evidence about disrupted

plots – today known through news accounts

and court cases – demonstrates no enhanced

intelligence benefit from the expanded search

and surveillance powers.

Out of concern for civil liberties, Congress

required the Inspector General of the

Department of Justice to investigate potential

civil liberties abuses by investigators and placed

some restrictions on the use of NSLs when it

reauthorized the PATRIOT ACT in 2006.

The reports coming out of these inspections

confirmed that the number of actual prose-

cutions was dwarfed by the number of NSLs

issued and people affected — and that the

powers had been misused by the FBI. However,

given the evidence of their inefficacy and

counter-productivity lawmakers might also

attend to the potential security drawbacks of

NSLs and other expanded search and surveil-

lance powers even when they are not abused.

Ethnic/Religious andBehavioral ProfilingFollowing 9/11, authorities employed multiple

profiling tactics – like the FBI’s “Interview

Project,” Immigration and Customs

Enforcement’s “Special Registration”

program, and the Transportation Security

Administration’s Computer Assisted Passenger

Prescreening System and ‘behavioral’ profiling

tactics – in their attempts to home in on those

individuals most likely to carry out terrorist

attacks. The FBI’s “Interview Project” screened

tens of thousands of American citizens

identified as Muslim and/or Arab. The inter-

views could not be mandatory without violating

14th amendment protections against differential

treatment based on ethnicity or religion, but

many Muslim and Arab Americans complied

due to feelings of patriotism, obligation, and/or

intimidation.

The Immigration and Naturalization Services

(now Immigration and Customs Enforcement

or ICE) also required male immigrants from

Muslim majority countries to perform a

‘Special Registration,’ a process in which, over

several months in 2002 and 2003, immigration

personnel photographed, fingerprinted, and

interviewed more than 80,000 registrants.

Thousands of these men were deported for

minor immigration violations, usually visa over-

stays. The rest were placed on a sort of

probation requiring them to report to immigra-

tion authorities at least once per year and every

time they entered or exited the country,

changed jobs, changed addresses, or enrolled in

universities, etc. They were also required to

enter and exit the country only through desig-

nated airports or sea ports.15

The Department of Homeland Security’s

Transportation Security Administration (TSA)

also took action seeking to filter potential ter-

rorists from the rest of the population. The

agency had to be mindful of Department of

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 24: COUNTERTERRORISM SINCE 9/11

24

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

Justice protocols (based on the 14th amendment)

preventing involuntary ethnic/religious profil-

ing of American citizens, but it did employ a

Computer Assisted Passenger Prescreening

System (CAPPS) especially sensitive to those

who were traveling or had traveled to Arab-

or Muslim-majority countries. The effect of

CAPPS was to apply more stringent scrutiny to

travelers with Arab and/or Muslim heritage

while also comparing travelers’ names, financial

transactions, housing information, family con-

nections, travel destinations, contact telephone

numbers, seat assignments, dates of travel,

passport information, method of payment, and

amount of luggage to those of known terrorists

or terrorists scenarios defined by databases and

streaming intelligence reports. CAPPS (and its

second and third generation offspring) then

ranks passengers according to their likelihood

of being a terrorist. The top 5 percent or so

(the exact percentage is classified) are subjected

to higher levels of screening that can include

luggage searches, pat downs, additional screen-

ing, and/or brief interviews.

The TSA also employs behavioral profiling,

whereby agents seek to discover passenger nerv-

ousness, irritability, or other suspicious signs

that might indicate their intentions to commit

terrorism. The methods are reputed to be highly

effective in Israel, where the national airline, El

Al, despite receiving almost daily terror threats,

has not experienced a major attack in over three

decades. TSA’s use of behavioral profiling is

much less intensive than El Al’s. The latter

approach submits every passenger to a battery

of open-ended questions and psychological

evaluations. By contrast, TSA’s Screening

Passengers by Observation Techniques (SPOT)

program only closely questions the rare passen-

gers that agents deem suspicious. In practice,

probably owing to the human tendency to inter-

pret the behaviors of poorly understood

out-group members as 'exotic' (Tajfel 1982),

TSA agents, according to multiple anecdotal

accounts, have been prone to apply greater

scrutiny to Muslim, Arab, Sikh, and South-

Asian air passengers.

Given that the 19 airplane-hijacking suicide

bombers of 9/11 were all Muslim and most

were Arab (15 from Saudi Arabia, two from

the United Arab Emirates, one from Egypt,

and one from Lebanon), it was not entirely irra-

tional for security officials – fearing that other

terrorist cells might already be hiding in the

country – to focus their attention on the one in

100 Americans of Muslim of Arab descent

rather than on the entire population. In fact, the

case for profiling has always seemed common-

sensical: if police know the basic characteristics

of their suspects (height, weight, eye-color,

etc.), they should focus more attention on peo-

ple sharing those characteristics. By reducing

the number of people who must be questioned

or searched, investigators can boost the strength

of the ‘signal’ of terrorism and reduce the

‘noise’ from innocent populations.

1 . E T H N I C / R E L I G I O U S P R O F I L I N G

Despite the apparently sensible basis for

profiling, there is no evidence that U.S.

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 25: COUNTERTERRORISM SINCE 9/11

25

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

profiling policies have worked to catch terror-

ists. According to a 2003 Government

Accountability Office (GAO) Report on the

FBI’s ‘Interview Program,’ the FBI and DOJ

provided no specific evidence that the program

had generated any leads and over half of the

FBI agents the GAO spoke with “expressed

concerns about… the value of the responses

obtained in the interview project” (Government

Accountability Office 2003, pgs. 5-6). The

massive ‘Special Registration’ program of ICE

and DHS never captured any terrorists either.

After two years of cataloguing and interviewing

tens of thousands of immigrants and visa-hold-

ers the program was scaled-back (reducing

visitors’ reporting requirements) and re-named

“US-VISIT.” So far, there is no evidence of any

terrorist being caught in the act by the CAPPS

system either (or its second generation ‘CAPPS

II,’ or its third generation ‘Secure Flight’). And

while TSA’s behavioral profilers have suspected

and interviewed hundreds of thousands

of travelers, none of them were engaged in

terrorist activities.

Religious and ethnic profiling fails similarly to

data mining. There are simply too few terrorists

from which to generalize a useful profile.

While extremely few people are involved with

terrorism, millions of American citizens, resi-

dents, and visitors are law-abiding Muslims and

Arabs. A profiling policy that boosts the signal

of Muslims and Arabs does not significantly

boost the signal of terrorists, but instead

amplifies a slightly narrowed bandwidth of

informational noise representing Muslim and

Arab populations.

The case of Brandon Mayfield clearly illustrates

the poor outcomes generated by profiling based

on widespread characteristics like religion.

Mayfield, a Portland, Oregon attorney, was

investigated and jailed by the FBI for several

weeks on the grounds that: a) his fingerprints

were a partial-but-weak match with those left

by a Madrid Bombing suspect; and b) he had

converted to Islam several years prior. Despite

contravening objections and evidence provided

by Spanish intelligence, the FBI rushed

to judgment, obtained a series of FISA war-

rants and a “sneak and peek” warrant, entered

Mayfield’s home surreptitiously, took dozens

of photographs, scanned his hard-drives,

subpoenaed his phone and Internet records,

and eventually detained him for two weeks

while telling reporters that he was responsible

for the Madrid bombings of 2004. By the

time agents discovered Mayfield’s innocence,

thousands of investigator hours had been spent.

Mayfield sued and the government paid two

million dollars restitution to him in an out-of-

court settlement (Epps 2007).

Profiling not only produces ‘false positives,’ like

Mayfield; it may also generate ‘false negatives.’

The few terrorists able to pass through airport

screenings since 9/11 – failed “shoe bomber”

Richard Reid and would-be Christmas Day

bomber Umar Farouk Abdulmutallab –

illustrate how the policy may simply inspire

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 26: COUNTERTERRORISM SINCE 9/11

26

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

terrorist groups to shift the racial profiles of

their operatives. Shoe bomber Reid was

half-Caucasian, half-Jamaican, and a British

national. Farouk Abdulmutallab was African,

from Nigeria. Others, too, have shown the abil-

ity of terrorists to recruit outside phenotypical

stereotypes to avoid ethnic profiling, including:

Hispanic-American Jose Padilla, half-Pakistani,

half-American David Headley (who adopted

his mother’s Judeo-Christian name), white

Illinoisan Michael Finton, the home-schooled

Californian Adam Gadahn (AKA Abu Yahya),

Alabama-Native and former Junior Class High

School President Omar Hammami (AKA Abu

Mansoor Al-Amriki), Hispanic-American and

one-time Boy Scout Bryant Neal Vinas, and

blonde-haired, green-eyed suburbanite Colleen

LaRose (AKA Jihad Jane).

Some researchers predicted this shift in recruit-

ing strategy as early as 2002. Then, analysts

used statistical modeling to demonstrate how

any screening system applying heightened

scrutiny to some profiles and not others could

easily be overcome by terrorist organizations

(Chakrabati and Strauss 2002). By simply

sending their members on “dry run” flights

without any explosive devices, extremist groups

can determine who among their membership

can pass through the system unhassled.

Terrorists can reasonably infer that those who

consistently fail to trigger the system do not fit

the ‘suspect profile’ and are consequently ideal

candidates to execute attacks. By testing the

profile, Chakrabati and Strauss’ model showed,

terrorists can reverse engineer its components

in only two or three iterations and easily beat it

with non-Arab recruits. CAPPS profiles, there-

fore, can only outperform random-screening

procedures if terrorists are unwilling to test the

profiles more than a few times (Ibid.). To the

greatest extent possible, many security experts

conclude, searches of people and luggage

should occur without a discernible pattern that

can be reverse engineered.

Given the major weakness of a two-tiered

screening system relying on profiling, security

experts have also recommended applying the

highest available levels of screening to all pas-

sengers (Chakrabati and Strauss 2002; Schneier

2009). It was the universal screening for metals

and explosives that forced Richard Reid to

attempt to use an unreliable shoe bomb in late

2001. Eight years later, the requirements that

passengers submit their shoes to x-ray screening

and carry no more than 3 oz. of any liquid onto

a plane posed hurdles leading to the inadequate

construction of Abdulmutallab’s unreliable

undergarment bomb. These defenses, far more

than the extra-screening of behavioral profiling

or pat-down searches, have deterred or compli-

cated terrorist attacks. Enhancing screening for

all can provide heightened security without cre-

ating a loophole for terrorists who do not fit the

terrorist profile. If universal screening technolo-

gies are prohibitively expensive (e.g. if full body

scanners cannot be deployed in every airport),

evidence suggests that randomly selecting

passengers for heightened screening is more

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 27: COUNTERTERRORISM SINCE 9/11

27

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

effective at catching terrorists and deterring

them from attempting attacks than two-tiered

profiling (Chakrabati and Strauss 2002;

Schneier 2009).

2 . B E H AV I O R A L P R O F I L I N G

According to government reviews, news

reports, and psychological studies, behavioral

profiling does not appear to be any more effec-

tive than ethnic and religious profiling. The

TSA’s (Screening of Passengers by

Observational Techniques) SPOT program

attempts to recognize ‘malintent’ in travelers,

but it is based on the assumption that terrorists

will exhibit outwardly suspicious behavior that

can lead interrogators to further probe for signs

of duplicity. However, the peer-reviewed science

on ‘malintent’ detection – recently reviewed in

Nature – suggests rather strongly that it cannot

work. And like other profiling, the program has

resulted in no terrorist plot disruptions. Fewer

than 1 percent of the 272,000 individuals inter-

viewed by SPOT agents were arrested, all of

them for criminal activities or outstanding war-

rants. With a 99% false positive rate for any

criminal activity and 100% false positive rate

for terrorism, it seems there is little to recom-

mend the program.

Some claim that behavioral profiling has very

effectively secured Ben Gurion airport in Israel.

But officials there use so many layers of (time-

consuming) security that their overall success

cannot be attributed to a single factor. Terrorists

might worry about face-to-face interviews with

security officials who ask very specific but

open-ended questions, but they also must worry

about vehicle checkpoints on the way into the

airport, multiple layers of x-ray machines and

metal detectors, and sophisticated explosives-

detectors for checked luggage. The blanket

surveillance and questioning of air passengers –

and the very time-consuming focus on non-

Jewish passengers – might be one element in a

security system causing terrorists to seek easier

targets than the airport, but that does not mean

that the U.S.-style behavioral profiling of SPOT

can be effective. On the contrary, a side-by-side

comparison of the security systems seems

only to highlight the chasm between the two.

And as Israeli security consultants who once

hoped to scale the system up and bring it

to the U.S. point out, “Adopting the full Israeli

system won’t work, because of costs, time and

legal differences” (Guttman 2010). “People

simply won’t agree to spend all that time and

money” (Ibid.)

3 . A I R P O RT S E C U R I T Y E V O L U T I O N

The DHS’s most recent (Spring and Summer

2010) shifts in airport screening policy seem to

incorporate some awareness of the limitations

of profiling. According to news reports, the

latest screening system will include a higher

percentage of random-screening and some lay-

ers of security will remain ‘unseen,’ preventing

reverse engineering (Zeleny 2010). Both of

these modifications were recommended by

Chakrabati and Strauss, Bruce Schneier, and

other security analysts. In addition, TSA

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 28: COUNTERTERRORISM SINCE 9/11

28

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

reports it will be installing over 450 full-body

scanners across the country by the end of 2010,

950 by the end of 2011, and 1800 by the end of

2014, enough for over half the security lines in

the largest, highest priority airports. Eventually,

the machines will fully replace magnometers,

since the latter fail to detect non-metallic

weapons like ceramic knives or chemical explo-

sives.16 These changes appear to be steps in the

right direction, but DHS still apparently has

a good deal of faith in the value of profiling,

as they are investing incredible sums – $1.3

billion through 2020 (enough to buy 8,000 body

scanners) – in the development of an accurate

terrorist profile for their CAPPS filters

(Government Accountability Office 2010).

Those efforts, as discussed above in the section

on data mining, are likely to meet with contin-

ual frustration because data-driven solutions

to the challenge of finding terrorists rely on the

kinds of data that simply do not exist.

‘Enhanced InterrogationTechniques’ 17

After 9/11, popular narratives of terrorists por-

trayed them as extremely hardened fighters,

maybe even ‘unbreakable.’ Would they respond

favorably to the interrogation methods

developed by police to encourage criminals

to confess their crimes or turn on their

co-conspirators? Many who had the power to

control or influence policy believed they would

not. And given that hundreds or thousands

of lives might be at stake, they thought that

hardened terrorists might need to be softened

up with harsher treatment.

Thus, the Bush Administration and the CIA

General Counsel met with and orally requested

opinions from the Department of Justice on

how to legally widen the array of tools available

to interrogators throughout late 2001 and

2002.18 On August 1, 2002, Assistant Attorney

General of the United States, Jay Bybee, sent

memos to legal counsel for the White House

and CIA explaining the conditions under which

CIA interrogators could use techniques includ-

ing “(1) attention grasp, (2) walling, (3) facial

hold, (4) facial slap (insult slap), (5) cramped

confinement, (6) wall standing, (7) stress posi-

tions, (8) sleep deprivation, (9) insects placed in

a confinement box, and (10) the waterboard.”19

A supplementary memo, by Deputy Assistant

Attorney General John Yoo offered a legal

opinion explaining how and why the techniques

might not constitute ‘torture’ in violation of the

U.N. Convention Against Torture.

In both documents, Bybee and Yoo assert that

the methods probably do not cause long-term

physical or psychological damage if used in rea-

sonable doses. They also cite the fact that the

methods (except for ‘insects placed in a confine-

ment box’) are used on American military men

and women as a part of their Survival, Evasion,

Resistance and Escape (SERE) training. That

program was first developed out of a Korean

War training program designed to expose (and

hopefully inoculate) soldiers to the brutality

they might encounter if captured by the enemy.

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 29: COUNTERTERRORISM SINCE 9/11

29

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

It is unclear who broached the use of SERE

tactics on terrors suspects first – CIA Director

George Tenet and his number two John

McLaughlin, or top executives in the White

House. But the purpose of the tactics was clear:

to bring more tools to bear in the struggle to get

information out of terrorists. The tools were

thought to work in one of two ways. The most

physically coercive – like the slapping, shaking,

walling, cramped confinement, and waterboard-

ing – were designed to be so unpleasant as

to force cooperation. Stress positions, sleep

deprivation, and sensory disorientation were

intended to break detainees’ will from within

by causing them to harm themselves and

eventually slink into a state of psychological

despondency. Both classes of coercion were

intended to make it clear to detainees that they

were not in control of their bodies and they

could only experience relative calm and com-

fort by cooperating with their interrogators.

The long-time SERE trainers charged with

implementing the new interrogation regime,

James Mitchell and Bruce Jessen, believed that

the methods could induce a state of “learned

helplessness,” first described by experimental

psychologist Martin Seligman (Seligman 1972).

Seligman found that punishing dogs with

electric shock at random intervals, irrespective

of their behavior, created despondent psychosis

and pathological dependency. It is still not

entirely clear why Mitchell and Jessen believed

detainees in such mental states would produce

valuable information, but Seligman has

publicly distanced himself from that notion.

1 . E N H A N C E D I N T E R R O G AT I O N

A N D I N T E L L I G E N C E

In our review of declassified CIA documents,

intelligence reports, investigative journalistic

accounts, and even some interrogation

transcripts (see ‘Extended Bibliography’ for

a complete list) we uncovered no evidence

demonstrating that enhanced interrogation

techniques aided the thwarting of a single ter-

rorist plot. However, as reports of prisoner

abuse at Abu Ghraib, Guantanamo Bay, and

Bagram Air Force Base surfaced, Bush White

House and CIA officials, led by Vice President

Dick Cheney, were quick to assert that en-

hanced interrogation had saved lives. The

former vice president pointed to secret informa-

tion allegedly demonstrating the techniques had

worked. In 2009, he even publicly pressured the

CIA to declassify memos showing “what we

learned through the interrogation process and

what the consequences were for the country.”20

When the documents emerged, Cheney

claimed, “The documents released Monday

clearly demonstrate that the individuals sub-

jected to enhanced interrogation techniques

provided the bulk of intelligence we gained

about al Qaeda.” The statement was technically

true. The same people subjected to enhanced

interrogation techniques – Abu Zubaydah and

Khalid Sheikh Muhammed (KSM), in particu-

lar – were the same people who divulged a

great deal of information to authorities. The

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 30: COUNTERTERRORISM SINCE 9/11

30

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

only problem with Cheney’s story is that the

available evidence suggests the detainees were

most cooperative at the points in their interro-

gation when enhanced methods like

waterboarding were not being used.

Abu Zubaydah — Mitchell and Jessen’s first

‘learned helplessness’ case-study — is instruc-

tive. Operating in a secret CIA jail in Thailand,

the SERE trainers were allowed to direct the

second phase of the interrogation of Abu

Zubaydah – then thought by some to be third in

Al Qaeda’s chain of command. The first phase

had been carried out by FBI interrogators who

nursed Zubaydah back to health after he sus-

tained gunshot wounds during his capture and

used traditional rapport-building approaches

during his recovery (Isikoff 2009, April 25).

They gained his trust and drew vital informa-

tion about Al Qaeda’s personnel and how the

9/11 attacks had been planned and carried out

(Soufan 2009). He identified many Al Qaeda

operatives including KSM, the mastermind

behind 9/11 (CIA 2005). The former SERE-

trainers contracted by the CIA then took over,

claiming jurisdiction over the interrogations,

slamming Zubaydah against a flexible plywood

wall, slapping him, placing him in confinement

boxes, and waterboarding him for several

sleep-deprived weeks (Isikoff 2009). Finally,

unable to secure any further information, they

too determined that he must have already

offered his most valuable information to FBI

interrogators.

Though fewer details from KSM’s interrogation

have been made available to the public, there is

no credible evidence suggesting that any of the

information he provided was in response to

coercive interrogation practices. What is known

is that the CIA used a mix of coercive and rap-

port-based approaches and that he divulged his

most useful information to an interrogator,

Deuce Martinez, who eschewed the rougher

tactics. As New York Times correspondent, Scott

Shane, reports, “Mr. Martinez came in after the

rough stuff, the ultimate good cop with the clas-

sic skills: an unimposing presence, inexhaustible

patience, and a willingness to listen to the

gripes and musings of a pitiless killer in ram-

bling, imperfect English. He achieved a rapport

with Mr. Mohammed [KSM] that astonished

his fellow C.I.A. officers” (Shane 2008,

June 22). KSM even reportedly wrote poems

to Martinez’s wife as a show of respect

to Martinez. Over time the CIA transitioned

to interrogation that used much less physical

coercion and more rapport-based approaches.

Reports from KSM’s captors suggest that he

offered his most useful information when

interrogators appealed to his intellectual vanity.

Apparently intelligence agents flattered him

into giving multiple lectures about the structure

and operation of Al Qaeda – turning him into

a virtual CT consultant for the U.S.

A subsequent 2004 CIA Inspector General’s

report into enhanced interrogation techniques

used on Zubaydah and KSM and others con-

cluded that the coercive techniques had not

uncovered evidence of imminent plots. FBI

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 31: COUNTERTERRORISM SINCE 9/11

31

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Director Robert Mueller, in a December 2008

interview with Vanity Fair magazine, offered the

same conclusion on the techniques’ efficacy for

gaining crucial information (Rose 2008). The

one CIA operative who ever publicly stated that

the CIA’s “enhanced interrogation regime”

saved lives, retracted his story two years later.

John Kiriakou had said in an ABC interview

that one application of waterboarding to Abu

Zubaydah had produced actionable life-saving

intelligence. It later came out that Zubaydah

had been waterboarded 83 times, that Kiriakou

witnessed none of the interrogations, and that

he was repeating non-credible information he

had heard from others. He now concludes, “In

retrospect, it was a valuable lesson in how the

CIA uses the fine arts of deception even among

its own” (Stein 2010).

Claims that enhanced interrogation delivered

critical intelligence to the foiling of terrorist

plots have also been challenged by foreign intel-

ligence agencies. After a staff associate to

former Vice President Dick Cheney claimed in

a book that a 2006 Heathrow hijacking attempt

was disrupted by intelligence gathered from

‘enhanced interrogation,’ Peter Clarke, then-

head of Scotland Yard’s anti-terrorism division,

called his account “completely and utterly

wrong” because the “deduction that what was

being planned was an attack against airliners

was entirely based upon intelligence gathered

in the U.K.” (Mayer 2010).

2 . D E F I A N C E , L E A R N E D H E L P L E S S -

N E S S , A N D P O O R I N T E L L I G E N C E

Basic human psychology reveals why coercive

interrogation has not proven effective. Humans

may tend to seek pleasure and avoid pain, but

they also regularly sacrifice their pleasure —

even their lives — for what they view as higher

goals. Parents sacrifice for children, children for

parents, soldiers for nations, lovers for love,

artists for creation, and many for money. Even

so, reductive stimulus-response understandings

of human nature persist, leading to simplistic

interrogation strategies that overgeneralize

based on a partial understanding of human

behavior. Such simple and mechanical theories

of human motivation ignore much of the

knowledge accrued by the fields of psychology

and social psychology over the last several

decades, particularly the key distinction

between ‘intrinsic’ and ‘extrinsic’ motivation.

While external factors like rewards and

punishment can certainly have some effect on

peoples’ behaviors, internal, intrinsic motiva-

tions are at least as important in determining

their actions.

Irhabis are individuals invested in a powerful

narrative that casts them as warrior heroes in

a trans-worldly battle against injustice. Whether

as well-educated moderns or working-class

flunkies, they, like virtually all humans, are

driven to be the primary causal agents in their

lives (see Deci and Ryan 2004 for a thorough

review of ‘self-determination’ research). They

imagine themselves playing a decisive role in

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 32: COUNTERTERRORISM SINCE 9/11

32

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

history — providing a critical push to ridding

the Islamic world of western influence —

and effectively paving the way for an era of

peace and justice.

Given these powerful psychological motiva-

tions, it may be very difficult for interrogators

of Islamist extremists to devise any amount

of purely external incentive (pleasurable or

painful) capable of overriding a detainee’s

intrinsic motivation to control his own behavior

and protect secrets to which he and his com-

rades have mutually committed themselves.

‘Reactance’ and ‘defiance’ theories both show

that people tend to steel their wills against those

who attempt to constrain their freedom or harm

them (Brehm and Brehm 1981; Sherman 1993).

Abusing and threatening people – as ‘terror

management theory’ predicts – often causes

them to hold more firmly to their ideological

commitments (Solomon et al. 2004).

As for “learned helplessness,” the evidence sug-

gests it is counterproductive for interrogators

(Fein et al 2006). The abuse, according to trau-

matic stress theory, causes many people to

simply dissociate from the traumatic environ-

ment, psychologically withdrawing to the point

that they may lose their connection with reality

(Hobfoll 1991). Psychologists’ and militaries’

investigations into the efficacy of physically

coercive interrogation highlight these concerns.

The CIA’s own previous interrogation manuals,

published in 1963 and 1983, made much of the

fact that some defiant individuals are better able

to withstand pain than most civilians believe,

while other broken individuals may provide

unreliable information. “Use of force is a poor

technique,” the manual warned CIA agents,

“yields unreliable results, may damage subse-

quent collection efforts, and can induce the

source to say what he thinks the interrogator

wants to hear” (CIA 1963).

Physically coercive interrogation techniques

intended to incentivize cooperation often

appear only to escalate and prolong the battle

of wills between captors and detainees. Another

set of techniques was designed with the goal

of undermining the will of the detainee itself.

Throughout the 1950s and ‘60s, the CIA

researched the effects of sleep deprivation,

sensory disorientation (achieved by the constant

presence of absence of sensory stimuli), and

stress positions on detainees (McCoy 2006).

Because these techniques are also incredibly

uncomfortable and clearly adversarial, they still

inspire unhelpful defiance, but they also weaken

the individual psychologically in ways that

some hoped might attenuate that defiance. The

techniques also, though, alter subjects’ mental

states to the point where they become easily

confused and open to suggestion (CIA 1963),

psychotic break, hallucinations, and/or inability

to distinguish between true and false memories

(Mason and Brady 2009; Pilcher and Huffcutt

1996).21 Prolonged sleeplessness and a loose

connection to reality can easily result in false

confessions or false allegations against others

stemming from subjects’ confabulation of

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 33: COUNTERTERRORISM SINCE 9/11

33

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

reality with fantasy or the introduction of false

memories by interrogators.22

It was just such false information – delivered

under torturous duress by Ibn al-Shaykh al-Libi

– that supported the Bush administration’s erro-

neous conclusion that Iraq had been involved in

Al Qaeda’s 9/11 attacks. That connection was

strongly questioned by contemporary CIA and

Defense Intelligence Agency (DIA) reports and

later thoroughly debunked by a U.S. Senate

Select Committee and in various media (United

States Senate Select Committee on Intelligence

2006, pgs. 106-108; Kirk 2008).

Chasing the false leads of information given

under duress has apparently become a major

distraction at the FBI, adding to the signal

detection challenges already exacerbated by

other controversial CT tactics. A “seasoned

counterterrorist agent” reported to Vanity Fair’s

David Rose recently that “At least 30 percent

of the FBI’s time, maybe 50 percent, in coun-

terterrorism has been spent chasing leads

[produced by detainees under duress] that were

bullsh*t.” They try “to filter them. But that’s

ineffective, because there’s always that ‘What

if ?’ syndrome” (Rose 2008).

The self-defeating side-effects of enhanced

interrogation have been warned against by

history’s military leaders for hundreds of years.

“[P]utting men to the torture, is useless,”

Napoleon said. “The wretches say whatever

comes into their heads and whatever they think

one wants to believe.” Recently, China banned

the practice after reports revealed that it had led

to false confessions, the executions of

innocents and, conversely, freedom for the

guilty (Jacobs 2010).

3 . THE TICKING TIME BOMB SCENARIO

What about the “ticking time-bomb” scenario

where 1) a nuclear bomb is armed in a major

city; 2) it is scheduled to detonate within 24

hours; 3) security personnel have apprehended

a suspect who they believe knows about the

location of the bomb; and 4) they know that he

knows this potentially life-saving information?

The ticking time bomb thought experiment is

based on no confirmed incident in history

(Scheppelle 2005) but rather an extreme hypo-

thetical scenario designed by torture apologists

(and promoted by the popular television show

‘24’) to elicit the acknowledgement that in

some situations enhanced interrogation could

be justified. But such a conclusion rests on

an assumption — that the suspect would con-

fess rather than become defiant in the face of

torture — which psychological and empirical

evidence suggests is incorrect. KSM was water-

boarded 183 times over a one month period

without giving helpful information to interroga-

tors (Shane 2009). The ticking time bomb

would have exploded 29 days earlier — clearly,

a faster solution would be needed.

Moreover, the limited temporal window of the

ticking time-bomb scenario would only seem to

work in terrorists’ favor. In a scenario in which

a terrorist suspect’s secret knowledge is only rel-

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 34: COUNTERTERRORISM SINCE 9/11

34

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

evant for 24 hours (or, in the case of improvised

explosive devices, some matter of days), the

intransigent detainee only needs to remain defi-

ant for a short period to realize his mission.

4 . F R O M S U S P E C T S T O I N F O R M A N T S

Putting detainees through a psychological

ordeal might, in theory, “soften up” terrorists so

that they can more easily be “broken.” But

there is no evidence that “breaking” detainees

produces helpful intelligence anyway. The best

intelligence appears to come from suspects who

have been “turned” into informants through

skillful interrogations relying on a rapport

between interrogators and detainees (B’Tselem

2000, 51). Rapport-based approaches seek to

uncover and leverage detainee’s internal

motivations to glory, recognition, power, and

survival, without emphasizing and exacerbating

an adversarial relationship. Skilled interrogators

empathize with their subject and appeal to

his vanity, his self-interest, and his love of his

family. They sometimes use deception to trick

him into believing that talking will help him

or use trusted religious clerics or family mem-

bers to seek the subject’s cooperation (among

other approaches). Often, as discussed later,

it is the (even illusory) trust developed through

rapport approaches that serves as the founda-

tion of plea settlements delivering troves of

useful intelligence.

These more sophisticated interrogation tech-

niques rolled up Zarqawi’s terrorist network in

Iraq. One man providing life-saving informa-

tion was promised help with a divorce from a

shameful marriage and a chance for recon-

ciliation with his first wife (Alexander 2008,

Chapters 10-11). Another was promised that his

son would be treated to a fair trial instead of

being tried by his enemies (Ibid., Chapter 21).

One most difficult subject of the interrogations

in Iraq was a man who had offered no informa-

tion to an inexperienced interrogator using an

adversarial approach. But when he was fooled

into accepting a bogus deal that would have

made him a powerful man in post-occupation

Iraq, he revealed information leading directly to

Zarqawi (Ibid., Chapters 25-30). This may have

been an anomalous case, however, since expert

interrogators often complain that coercive inter-

rogation tactics “poison the well,” destroying

the prospect of turning suspects into informers

(Alexander 2008). This is what happened in

Zubaydah’s case, according to FBI interrogator

Ali Soufan, who said, “Abu Zubaydah was

making progress before torture techniques [were

used]” (Soufan, 2009).

Rapport-based approaches, while they require

interrogators with keen social skills, have

proven themselves highly effective, generating

large amounts of valuable information about

terrorist networks. Despite the common misper-

ception that terrorists are too ‘hardened’ to

respond to anything but violence, many still

have connections to family and friends that they

care about, ambitions they wish to fulfill, and

egos that can lead them to speak more openly

than they intend when they are in the hands of

a skilled interrogator.

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 35: COUNTERTERRORISM SINCE 9/11

35

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Detention and Prosecution of Terrorism SuspectsTwo months after 9/11, President George W.

Bush issued an executive order asserting his

power to detain certain terrorism suspects as

‘unlawful combatants’ who, as neither criminals

nor prisoners of war, were not subject to the

detention and prosecution standards defined for

either. Instead, these “combatants” would be

tried in the first U.S. Military Tribunals since

World War II. They could be detained preven-

tatively and indefinitely without rights to full

due process. These were some of the most con-

troversial CT measures of the post-9/11 period.

First instituted by President Bush’s Executive

Order of 2002 and then ratified by Congress in

the 2005 Military Commissions Act, military

tribunals also permitted the use of hearsay evi-

dence and testimony acquired under enhanced

interrogation — evidence civilian courts sup-

press (though these evidentiary standards for

military commissions were revised to align

more closely with Article III courts in 2009).

Today, the Obama administration is deciding

whether and how to prosecute the remaining

175 detainees at Guantanamo Bay military

prison, a focal point for much of the detention

controversy. Pressure from several Senators and

some 9/11 victims’ families motivated Attorney

General Eric Holder to back down from his

plans to try alleged 9/11 conspirators in

Manhattan. Opposition was based partly on

public safety concerns and cost and partly on

the assumption that a military tribunal

was more likely to deliver a conviction than

a civilian criminal trial. And today the

Administration is considering supporting legis-

lation that would remove ‘Miranda’ protocols

requiring law enforcement to inform terrorism

suspects of their right to an attorney. The unex-

amined assumption behind such a proposal is

that not having an attorney will better motivate

suspects to confess and become an informant.

While there has been considerable debate over

the legality of preventative detention (which,

for this paper’s purposes, we define broadly

as the non-battlefield detention of a person

despite a lack of evidence sufficient to charge

and hold him/her with a terrorism-related

crime) and trying terrorism suspects in military

rather than civilian courts, there has been less

discussion of these tactics’ efficacy for prevent-

ing, reducing, or ending terrorism. Their

efficacy for combating terrorism cannot be

measured by simply counting increased deten-

tions or convictions since lowered evidentiary

standards could simply produce greater counts

of detained innocents while the guilty go

unpunished. Instead, lowered evidentiary thresh-

olds for detention and prosecution must be

evaluated in terms of their ability to accurately

identify and prosecute the genuinely guilty.

Altered due process standards and trial venues

must also be evaluated for their ability to deliver

good intelligence to security agencies while

also preventing important state security secrets

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 36: COUNTERTERRORISM SINCE 9/11

36

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

from becoming known by the state’s enemies.

And finally, we must evaluate whether lower

evidentiary standards for detention and prose-

cution increase or decrease the legitimacy of

the U.S. and its allies relative to the legitimacy

of its enemies. Effective justice processes must

increase the motivation of individuals here or

abroad to assist in CT efforts, and decrease the

motivation of individuals to tacitly or actively

support terrorist activity.

1 . D E L I V E R I N G J U S T I C E

Our review of indictment and prosecutions sta-

tistics for military tribunals and Article III

civilian courts (e.g., federal district courts,

courts of appeals, and the Supreme Court)

shows that the latter venues have hosted orders

of magnitude more terrorism cases and thus

have produced many more terrorism convic-

tions. Between September 11, 2001 and

September 11, 2008, the Department of Justice

has resolved 593 “terrorism-related” cases in

Article III courts, winning convictions in 523

cases (by trial or plea). Of those convictions,

190 were of individuals associated with militant

groups like Al Qaeda.23 Military courts, by con-

trast, convicted just three people involved in

terrorism over the same period.24 Though the

very low sample size for cases by military tri-

bunals challenges efforts to compare the venues,

we can at least conclude that civilian judges and

prosecutors handling terrorism cases are more

experienced than their counterparts in relatively

untested military tribunals.

Some, even without substantial data, argue

that trying suspected terrorists in military rather

than criminal courts increases the chances

of conviction. This might have been the case

during the period from 2001 to 2009 when

Military Commissions admitted statements

made under duress and the testimony of

hearsay witnesses. Then, a suspect might be

convicted because some other detainee seeking

to end a coercive interrogation falsely accused

him of Al Qaeda ties.25 But easing such convic-

tions does not necessarily secure better justice,

just more convictions.

The exceptional justice processes applied to ter-

ror suspects during and after the invasion of

Afghanistan resulted, in part, from the fact that

they were captured in a unique environment

akin to a warzone but hardly resembling the

atmosphere imagined by the drafters of the

Geneva conventions. There was some legal

ambiguity about how the U.S. should proceed.

While The Red Cross and other human rights

organization interpreted the Geneva conven-

tions regarding detainee treatment as applying

to any and all combatants, members of the

Bush administration rejected this notion. They

interpreted the conventions to mean that they

were under no obligation to treat prisoners

detained in Afghanistan as ‘prisoners of war,’

citing the fact that they were not operating

according to rules of war requiring them to

fight openly as uniformed soldiers. Neither,

decision makers in Washington thought, was

the U.S. obliged to treat them as regular

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 37: COUNTERTERRORISM SINCE 9/11

37

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

American criminal suspects since they were

non-citizen combatants fighting against the U.S.

in a foreign land.

That murky legal environment was anomalous,

though, and could never serve as the model for

detaining and prosecuting terrorism suspects.

Very rarely do governments meet terrorists on

open fields of battle. Instead, they track down

terror suspects, investigate and surveil them,

and finally arrest them on criminal terrorism

charges. The situation in Afghanistan was

unique because a semi-sovereign government

of guerrilla fighters, the Taliban, was providing

safe haven for Al Qaeda’s training camps. Even

today, as the U.S. military fights the same com-

bination of guerrilla warriors and terrorists, it

uses better-formalized detention procedures in

Afghanistan and prosecutes the vast majority of

its cases through the Afghan judicial system. In

2001 and 2002, however, these procedures were

not in place. Thus, in addition to capturing

many Al Qaeda and Taliban fighters, Coalition

forces also detained scores of farmers and by-

standers. Other future Guantanamo detainees

were turned over to the U.S. by the Pakistani

government and bounty hunters, who were,

in some cases, more motivated to dispatch with

tribal rivals than deliver Al Qaeda leaders.

Prosecuting terrorist suspects captured in

murky situations by Coalition soldiers

or Pakistani bounty hunters, not experienced

police investigators, is qualitatively different

from prosecuting terrorism suspects such as

the would-be New York subway bomber, the

would-be Times Square bomber, or the would-

be Christmas day bomber. The guilt of the

latter terror suspects, like the guilt of terror

suspects tracked down by experienced investiga-

tors – is usually easily demonstrable even by the

evidentiary standards of traditional criminal

courts. The guilt of the former can be declared

or asserted, but rarely proven, since little evi-

dence rules out the possibility that they were

simply in the wrong place at the wrong time.

Convictions based on such slim evidence can-

not be counted as effective counterterrorism

since they may only imprison innocents.

Much of some policymakers’ and commenta-

tors’ opposition to holding civilian trials

for 9/11 conspirators has been driven by

concern that criminal trials mete out more

lenient sentences than military tribunals. But

this assumption, too, appears to be incorrect

(Gude 2010). The military officers who com-

prise military tribunals’ juries understand the

“fog of war” better than civilians and may be

more discerning between hard-core terrorists

and their hapless accomplices – and more sym-

pathetic to the latter. Such a notion may cut

against popular intuition, but recent sentences

delivered by military tribunals warrant observa-

tion. Osama bin Laden’s driver, Salim Ahmed

Hamdan — in the first military commission

since World War II — was sentenced by a jury

of military officers to just five and a half years

in prison, not the thirty years requested by pros-

ecutors. (Having already served most of those

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 38: COUNTERTERRORISM SINCE 9/11

38

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

years, Hamdan was free by the end of 2008.)

A similarly short sentence was delivered for

David Hicks. Both men are walking free today.

While the sample size of military convictions

is not large enough to analyze quantitatively,

the terrorism suspects convicted by military

tribunal received sentences much shorter than

those delivered by Article III Courts for compa-

rable crimes.26

2 . I N T E L L I G E N C E

Concern about trying terror suspects in criminal

courts has also focused on the risk of intelli-

gence leaks (Yoo 2009), but there exists no

evidence demonstrating that Article III courts

are a greater threat to government secrets than

military courts. In 1980, Congress passed and

the president signed into law the Classified

Information Procedures Act (CIPA) to guard

against intelligence-leaking during trials. CIPA

allows prosecutors to call a pre-trial conference

with the court and the defense to hammer out

what information should be considered secret,

and how all parties can effectively talk around

it during public proceedings.27 If the defen-

dants attempt to contravene the pre-trial

classified information guidelines set out by the

court, they can be promptly silenced and held

in contempt of court.

Some have argued that indefinite detention and

denial of the right to counsel (such as through

exemptions to Miranda rights) will result in

terrorist suspects providing more and better

intelligence sooner than they would if suspects

had the right to habeas corpus and to legal

counsel. Suspects, this line of reasoning goes,

will be more likely to confess, share informa-

tion, and otherwise provide good intelligence

to law enforcement if an attorney is not present

to counsel them. And if suspects have no

prospect of appealing their sentence (through

a habeas corpus petition), the thinking goes,

they will be more likely to confess than if their

case can be appealed.

However, there is good reason to believe that

terror suspects are more likely to cooperate with

authorities if they have attorneys to help them

negotiate a cooperation agreement. In exchange

for helpful information, the state might agree

to forego the death penalty, keep humiliating

information about the detainee from the public,

offer better prison conditions, or not deport

an innocent family member. Without a defense

attorney to negotiate such an exchange,

terrorist suspects may remain in a strictly

antagonistic posture with the state. Court

records and news accounts show that a number

of terror suspects have entered into such

cooperative bargains on the advice of their

attorneys. Bryant Neal Vinas, convicted of

a plot to bomb Penn Station in New York City,

agreed to provide information and act as key

prosecution witness in two terrorism trials in

Europe. David Headley, to avoid extradition

to India, Pakistan, or Denmark, pled guilty

to charges that he conspired to attack a

Danish newspaper that ran cartoons satirizing

the Prophet Mohammed. Other instances

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

Page 39: COUNTERTERRORISM SINCE 9/11

39

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

of cooperation include Ahmed Ressam, the

would-be “Millennium Bomber,” who offered

copious and invaluable intelligence to security

agents in his attempt to reduce his sentence.

Henry E. Klingeman, a former federal prosecu-

tor who defended Hemant Lakhani advises

terrorism clients in clear terms, “Your defense

here is to get a plea bargain to avoid a life sen-

tence. There is no way you try this case and

win” (Ryan 2010, June 10).

3 . T H E D I S C U R S I V E S T R U G G L E

Lawyers can be so helpful for gaining the coop-

eration of suspects precisely because their

clients are usually more focused on their image

as holy warriors than on how they can help the

state and themselves through cooperation.

Many times, the capture of a terrorist suspect

only represents a shift from violent struggle

with the state to symbolic struggle with the

state. Several terror suspects, consistent with

the deviance and labeling theory of sociologist

Howard Becker (1963) embrace the status

of ‘warrior’ that military commissions confer.

They reject comparisons to petty criminals

implied by trial in traditional criminal courts,

seek to fire their attorneys, and yearn for

symbolic or real martyrdom via military

commission. KSM, most famously, has made

it clear that he would prefer ‘martyrdom’

before a military tribunal over a civilian trial

(Glaberson 2008).

KSM’s declaration was part of a larger commu-

nications strategy seeking to show the state’s

EVALUAT ING CONTROVERS IAL COUNTER TERROR ISM TACT ICS

CT efforts to be hypocritical and unjust, and

irhabis’ efforts to identify themselves with a

steadily escalating decades-long war for a more

just world. On the day of his sentencing, the

would-be Times Square bomber Faisal Shahzad

also recited familiar aspects of this irhabi

narrative, declaring himself a “Muslim soldier”

fighting to defend Muslim people and Muslim

lands. When pressed by the judge as to his

willingness to kill women and children, he

replied flatly, “It’s a war” (Weiser and

Moynihan 2010, June 21).

Martial rhetoric was difficult for the U.S. to

avoid immediately after the 9/11 attacks, which

were experienced by the public, commentators,

and policymakers as acts of war. But, martial

legal classifications feed irhabis’ narrative of

a holy war against U.S. tyranny. That framing

of the struggle has had the unintended conse-

quence of reinforcing the image terrorists create

for themselves and deploy in their recruitment

campaigns.

Page 40: COUNTERTERRORISM SINCE 9/11

40

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

Before the 9/11 Commission issued its findings,

policymakers widely assumed that law enforce-

ment and security personnel needed more

powers to prevent terrorist acts. By the end of

2001, they were granted those powers. But the

assumption that law enforcement and security

agencies had been previously constrained is not

supported by evidence available to the public.

According to the government’s own investiga-

tions, the 9/11 attacks resulted from security

agencies’ inability to piece together evidence

of terrorist plotting in Phoenix, Minneapolis,

San Diego, and other cities. Law enforcement

and Intelligence did not need legislation

expanding surveillance powers so they could

gather more information. Rather, they needed

better methods for sharing and evaluating the

intelligence they already had.

The emotionalism of the post 9/11 period has

dissipated sufficiently for policymakers to take

a cold hard look at the evidence for and against

various CT tactics. These tactics should be

disentangled from one another so they can

be evaluated separately. At the same time, CT

efficacy must always be evaluated in context

to ensure not only that it is harmonious with

broader CT strategy but also that it does not

exacerbate the significant signal detection

challenges faced by the intelligence community.

The controversial CT tactics we have reviewed

often undermine the state’s attempts to win

the struggle for legitimacy and the cooperation

of bystanders, play into terrorists’ recruitment

narratives, and produce more informational

noise drowning out terrorists’ signals.

Given the weight of evidence against the

effectiveness of controversial tactics, the people

promoting their use should bear the burden

of proving their efficacy. Unless and until that

happens (and we have not seen good evidence

that it can or will), officials interested in provid-

ing effective security for their people should

forgo the tactics' use and invest their energies

in developing other practices able to improve

CT outcomes.

DISCUSSION AND CONCLUSIONS

Page 41: COUNTERTERRORISM SINCE 9/11

41

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

1. THE FEDERAL GOVERNMENT SHOULD DEVELOP STANDARD METRICS FOR EVALUATING INDIVIDUAL

COUNTERTERRORISM TACTICS AND ACT ON THE RECOMMENDATIONS OF THOSE EVALUATIONS.

For U.S. CT agencies to effectively design and adjust CT approaches effective against an evolv-

ing terrorist threat, they must engage in constant, rigorous evalution. The Government

Performance and Results Act requires all agencies of the U.S. government to set standards and

measurements for their successful performance. But there is no consistent ongoing evaluation

of individual CT tactics for their efficacy. Many evaluations – like the DOJ Inspector General's

review of the FBI's use of more accessible search and surveillance tools -- focus more on the

legality of tactics than their efficacy. In other cases, negative reviews are ignored. The NSA

continues funding its data-mining projects despite the National Academies’ of Science

considered conclusion that they cannot work. And TSA continues SPOT despite GAO reports

on its dubious efficacy.

2. INDEPENDENT INSTITUTIONS SHOULD REGULARLY CONVENE CT EXPERTS TO CREATE RIGOROUS,

PEER-DRIVEN PROCESSES TO EVALUATE CT TACTICS AND STRATEGY AND CREATE EVALUATION

METRICS. The most salient feature of contemporary evaluations of CT tactics is how few there

are, despite the central role they must play in preventing terrorism. Security agencies and/or

charitable foundations should regularly convene independent academics, think tanks, and

government security analysts to discuss and debate critical CT questions. This effort should

also result in greater peer review and perhaps even a refereed journal where these discussions

and debates can take place.

3. POLICYMAKERS AND SECURITY AGENCIES SHOULD UNDERSTAND THE CENTRAL ROLE THAT

COOPERATIVE COMMUNITY RELATIONS PLAY IN UNDERMINING TERRORISTS’ RECRUITMENT

EFFORTS, DISRUPTING THEIR NETWORKS, AND FOILING THEIR PLANS, AND SEEK POLICIES

THAT INCREASE THE LEGITIMACY OF U.S. COUNTERTERRORISM AND MOTIVATE INDIVIDUALS TO

COME FORWARD WITH HELPFUL INFORMATION. Since 9/11, Muslim and Arab Americans have

overwhelmingly cooperated with federal security agencies seeking to investigate and disrupt

plots. But if the state continues to regard these communities with suspicion, it risks escalating

the unhelpful stereotyping of patriotic American citizens and alienating or chilling the support

of perhaps our greatest intelligence asset when it comes to domestic CT security. Many U.S.

government security agencies and officials now seem to appreciate the security threat posed

by the deteriorating relations with affected communities, but our review highlights the need

for more, and more productive, outreach efforts.

RECOMMENDATIONS

Page 42: COUNTERTERRORISM SINCE 9/11

42

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

4. LAW ENFORCEMENT AND INTELLIGENCE AGENCIES NEED TO RESPOND TO THE POOR SECURITY

OUTCOMES OF CURRENT SURVEILLANCE STANDARDS BY ESTABLISHING MORE RIGOROUS

PROTOCOLS FOR CARRYING FORWARD INVESTIGATIONS. Chasing false leads distracts intelligence

agencies from the process of “connecting the dots” so often cited as a challenge for them.

Since expanded surveillance tools allow law enforcement and intelligence agencies to investigate

people without an adequate evidentiary predicate, they need to discipline themselves by setting

better surveillance standards within their organizations. In a similar vein, programs that inun-

date intelligence analysts with information but have shown little success, such as the NSA’s

data-mining efforts, should be terminated so that they no longer distract resources and attention

from proven CT methods.

5. MORE UNIVERSAL SCREENING METHODS SHOULD BE IMPLEMENTED IN AIRPORTS, GIVEN THEIR

EFFECTIVENESS SINCE 9/11 IN PREVENTING ATTACKS. Given that terrorist groups have avoided

heightened airport screening by recruiting new members who do not fit CAPPS (or ‘Secure

Flight’) profiles, DHS and the TSA need to universally apply the highest available levels of

screening to all passengers. Universal screening for liquids and metal have already made it more

difficult for terrorists to either bring, or effectively detonate, bombs on planes, as the botched

bombing attempts of the shoe bomber and the Christmas Day bomber demonstrate. Minimally-

invasive full body scanners can pose an even more effective barrier. TSA should install these

scanners as quickly as possible and also consider greater implementation of randomized and

unseen screening methods – which cannot be reverse-engineered by terrorists – if they continue

to distinguish passengers for secondary screening.

6. IMPROVE INTERROGATION PROTOCOLS THROUGH RESEARCH AND TRAINING PROGRAMS.

Interrogation is a critical opportunity for intelligence-gathering, but it remains more of an art

than a science despite great improvements in understanding human motivation over the last

thirty years. The present administration has taken an important step forward by creating

a High-Value Interrogation Group, a team of highly-trained interrogators, to be used with high-

value detainees. However, we recommend further steps like those proposed by Air Force reserve

Colonel and former interrogator in Iraq, Stephen Kleinmann. He has called for “a new intelli-

gence agency or sub-agency devoted solely to interrogation — sponsoring research, conducting

training and building a team of sophisticated interrogators with linguistic and psychological

skills” (Shane 2008, March 9) (emphasis added).

D ISCUSS ION AND CONCLUS IONS

Page 43: COUNTERTERRORISM SINCE 9/11

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

43

We wish to thank the many scholars,

researchers, journalists, and government

analysts whose work we have drawn on in

completing this research. This paper was

possible thanks to the generous support of

the Lotus Foundation and the Open Society

Institute. We thank them not only for funding

this research but also for encouraging our

independence in the process. We would also

like to thank our many colleagues who have

offered us comments and criticisms that have

helped to improve the paper. We are especially

indebted to Mike German, Martha Crenshaw,

Tom Parker, Gary Ackerman, Lisa Graves,

Graham Allison, Kate Martin, Peter Bergen,

Heather Hurlburt, Matt Bennett, Jameel Jaffer,

Karen Greenberg, Suzanne Spaulding,

Joshua Dratel and Anthony Romero for their

helpful engagement. While we very much

appreciate their counsel and collegiality,

we, of course, take full responsibility for any

errors in the work.

AUTHORS’ NOTE

Page 44: COUNTERTERRORISM SINCE 9/11

Alexander, Matthew. 2008. How to Break a Terrorist : the U.S. interrogators who used

brains, not brutality, to take down the deadliest man in Iraq. 1st ed. New York:

Free Press.

Art, Robert and Louise Richardson, eds. 2007. Democracy and counterterrorism :

lessons from the past. Washington D.C.: United States Institute of Peace Press.

Asharq Alawsat. 2010. “Al-Qaeda Appeals to Sympathizers for Donations.” August 12,

2010. http://www.asharq-e.com/news.asp?section=1&id=21931

Bamford, James. 2008. The Shadow Factory: The Ultra-Secret NSA from 9/11

to the Eavesdropping on America. Doubleday.

Bamford and PBS:Nova. 2009. “The Spy Factory.” Public Broadcasting Service.

February 3, 2009. http://www.pbs.org/wgbh/nova/military/spy-factory.html

Becker, Howard. 1963. Outsiders. Free Press. New York, NY.

Bergen, Peter and Bruce Hoffman. 2010. “Assessing the Terrorist Threat: A Report of

the Bipartisan Policy Center’s National Security Preparedness Group.” Bipartisan

Policy Center. Washington, D.C.

Brehm, S. S, and J. W Brehm. 1981. Psychological reactance: A theory of freedom and

control. New York: Academic Press.

B’Tselem. 2000. “Position Paper: Legislation Allowing the Use of Physical Force and

Mental Coercion in Interrogations by the General Security Service.” January.

http://www.btselem.org/English/Publications/Index.asp?YF=2000&image.x=10&i

mage.y=10

Central Intelligence Agency. 1963. KUBARK: Counterintelligence Interrogation-

July 1963.

http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB122/CIA%20Kubark%201-

60.pdf

Central Intelligence Agency. 2005. “Detainee Reporting Pivotal for the War Against

Al-Qa’ida”. June 3.

Chakrabarti, Samidh and Aaron Strauss. 2002. “Carnival Booth” Law and Ethics On The

Electronic Frontier. Massachusetts Institute of Technology Computer Science

and Artificial Intelligence Laboratory Student Papers Spring 2002. Chapter 3.1.

May 16, 2002. http://groups.csail.mit.edu/mac/classes/6.805/student-

papers/spring02-papers/caps.htm#_Toc9406731

Charters, David. 1994. The Deadly Sin of Terrorism : its effect on democracy and civil

liberty in six countries. Westport Conn.: Greenwood Press.

Crenshaw, Martha. 2009. “Evaluating the Effectiveness of Counterterrorism.” Prepared

for the International Studies Association 50th Annual Convention, New York,

New York, February 15-18, 2009.

Cronin, Audrey. 2009. How Terrorism Ends : understanding the decline and demise of

terrorist campaigns. Princeton: Princeton University Press.

Deci, E.L. and R.M. Ryan. 2004. Handbook of Self-Determination Research. Rochester:

University of Rochester Press.

Department of Defense, Department of Justice, Central Intelligence Agency,

National Security Agency, Office of the Director of National Intelligence. 2009.

Offices of Inspector General. “Unclassified Report on the President’s

Surveillance Program.” Washington D.C. July 10, 2009.

Department of Justice. 2007 Office of Inspector General. “A Review of the Federal

Bureau of Investigation’s Use of National Security Letters.” March 2007.

Http://www.usdoj.gov/oig/special/s0703a/final.pdf

Electronic Privacy Information Center. “Foreign Intelligence Surveillance Act Orders,

1979-2007.” Retrieved December 1, 2008.

http://epic.org/privacy/wiretap/stats/fisa_stats.html#footnote12

44

Epps, Garrett. “Vengeance is Brandon Mayfield’s.” October 3, 2007. Salon.com.

http://dir.salon.com/story/news/feature/2007/10/03/brandon_mayfield/index.html

Fein, Robert, Paul Lehner, and Bryan Vossekuil. 2006. Educing Information:

Science and Art – Foundations for the Future. National Defense Inteligence

College Press.

Fine, Glenn. 2007-A. “A Review of the Federal Bureau of Investigation’s Use of National

Security Letters.” Office of the Inspector General. Department of Justice. March

2007. Washington, D.C.

Fine, Glenn. 2007-B. “A Review of the Federal Bureau of Investigation’s Use of Section

215 Orders for Business Records.” Office of the Inspector General. Department

of Justice. March 2007. Washington, D.C.

Gellman, Barton. 2005. “The FBI’s Secret Scrutiny.” The Washington Post.

November 6, 2005.

Glaberson, William. 2008. “5 Charged in 9/11 Attacks Seek to Plead Guilty.”

New York Times. December 9, 2008

Government Accountability Office. 2003. “GAO-03-459: Justice Department’s Project

to Interview Aliens after September 11, 2001.” Washington, D.C.

Government Accountability Office. 2010. “GAO-10-535R: Aviation Security: Efforts

to Validate TSA’ Passenger Screening Behavior Detection Program Underway,

but Opportunities Exist to Strengthen Validation and Address Operational

Challenges.” Washington D.C.

Greenberg, Karen, Jeff Grossman, Francesca Laguardia, Michael Price, and Jason

Porta. 2010. “Terror Trial Report Card 2001-2009.” The NYU School of Law

Center on Law and Security.

http://www.lawandsecurity.org/publications/TTRCFinalJan14.pdf

Gude, Ken. “Criminal Courts Are Tougher on Terrorists than Military Detention.” January

20, 2010. Center for American Progress.

(http://www.americanprogress.org/issues/2010/01/criminal_courts_terrorists.html)

(Accessed January 20, 2011.)

Hewitt, Christopher. 1984. The Effectiveness of Anti-terrorist Policies. Lanham:

University Press of America.

Hobfoll, S. E. 1991. “Traumatic stress: A theory based on rapid loss of resources.”

Anxiety, Stress & Coping 4:187–197.

Jacobs, Andrew. 2010. “China Bans Court Evidence Gained Through Torture.”

The New York Times. May 31, 2010.

Jenkins, Brian Michael. 2010. “Would-Be Warriors: Incidents of Jihadist Terrorist

Radicalization in the United States.” RAND Occassional Paper.

Santa Monica, CA

Jonas, Jeff and Jim Harper. 2006. “Effective Counterterrorism and the Limited Role

of Predictive Data.” December 11, 2006. The Cato Institute. Policy analysis

584:1–11. http://www.cato.org/pub_display.php?pub_id=6784

Isikoff, Michael. 2009. “We Could Have Done This the Right Way.” Newsweek.

April 25, 2009.

Kean, T. H, and H. H Lee. 2004. 9/11 Commission Report: Final Report Of The National

Commission On Terrorist Attacks Upon The United States. 2004. New York:

WW Norton.

Kirk, Michael. 2008. “Bush’s War.” PBS:Frontline. March 25.

Lee, J. K, and H. R Rao. 2007. “Exploring the Causes and Effects of Inter-Agency

Information Sharing Systems Adoption in the Anti/Counter-Terrorism and

Disaster Management Domains.” P. 163 in Proceedings of the 8th annual

international conference on Digital government research: bridging disciplines

& domains: Digital Government Society of North America. Pg. 155-163.

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

WORKS CITED

Page 45: COUNTERTERRORISM SINCE 9/11

45

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Leitenberg, Milton. 2005. “Assessing the Biological Weapons and Bioterrorism Threat.”

Center for Security Studies of the Swill Federal Institute of Technology. Zurich.

ISBN 1-58487-221-7

Levitt, Matthew. 2008. “Al-Qa’ida’s Finances: Evidence of Organizational Decline?”

CTC Sentinel. Combatting Terrorism Center: West Point.

http://www.ctc.usma.edu/sentinel/CTCSentinel-Vol1Iss5.pdf

Lum, Cynthia, Leslie Kennedy, and Alison Sherley. 2006. “Are Counter-Terrorism

Strategies Effective? The results of the Campbell Systematic Review of

Counter-Terrorism Evaluation Research.” Journal of Experimental Criminology.

Vol. 2:489-516.

Mayer, Jane. 2010. “Counterfactual: A curious history of the CIA’s secret interrogation

program.” The New Yorker. March 29, 2010

Mason O.J., Brady F. 2009. “The Psychotomimetic Effects of Short-term Sensory

Deprivation’. Journal of Nervous and Mental Disorders. Vol. (10):783-5.

McCoy, Alfred. 2006. A Question of Torture: CIA Interrogation, from the Cold War

to the War on Terror. New York: Henry Holt and Co., Metropolitan Books.

McNicol, D. 2004. A Primer of Signal Detection Theory. L. Erlbaum Associates.

Mahwah, N.J.

Mueller, J., and M. Center. 2008. “The Atomic Terrorist: Assessing the Likelihood.”

Program on International Security, University of Chicago. Chicago, IL 15.

Naftali, Timothy. 2006. Blind Spot : The Secret History of American Counterterrorism.

New York: Basic Books.

National Research Council (U.S.). 2008. Protecting individual privacy in the struggle

against terrorists : a framework for program assessment. Washington D.C.:

National Academies Press.

Pilcher, J. J., and A. I. Huffcutt. 1996. “Effects of sleep deprivation on performance:

a meta-analysis..” Sleep 19:318.

Press, W. H. 2009. “From the Cover: Strong profiling is not mathematically optimal for

discovering rare malfeasors.” Proceedings of the National Academy of Sciences

106:1716-1719.

Priest, Dana and William Arkin. 2010. “Top Secret America.” Washington Post.

July 19-21, 2010. http://projects.washingtonpost.com/top-secret-america/

Rejali, Darius. 2009. Torture and Democracy. Princeton University Press. Princeton, NJ.

Rose, David. 2008 “Tortured Reasoning.” Vanity Fair. December 16th

http://www.vanityfair.com/magazine/2008/12/torture200812?currentPage=4

Rumney, Philip N.S. 2005-2006. “Is Coercive Interrogation of Terrorist Suspects

Effective?: A Response to Bargaric and Clarke.” University of San Francisco Law

Review. Vol. 40.

Ryan, Joe. 2010. “N.J. terror suspects to appear in court for bail hearing.”

The Star-Ledger. June 10, 2010.

Sandomir, David. 2009. “Preventing Terrorism in the Long Term: The Disutility of Racial

Profiling in Preventing Crime and the Counterproductive Nature of Ethnic and

Religious Profiling in Counterterrorism Policing.” Master Thesis. Naval

Postgraduate School. Monterey, CA. http://handle.dtic.mil/100.2/ADA514381

Scheppele, Kim L. 2005. “Hypothetical Torture in the ‘War on Terrorism.’” Journal of

National Security Law and Policy. Vol. 1:285.

Schmid, Alex P. and Ronald Crelinsten, eds. 1993. Western responses to terrorism.

London: Frank Cass Publishers.

Schneier, Bruce. “Profiling.” July 22, 2005. Schneier on Security Blog.

http://www.schneier.com/blog/archives/2005/07/profiling.html

WORKS C I TED

Schneier, Bruce. “Racial Profiling No Better than Random Screening.” February 4,

2009. Schneier on Security Blog.

http://www.schneier.com/blog/archives/2009/02/racial_profilin.html

Seligman, Martin E. P., 1972 “Learned Helplessness.” Annual Review of Medicine.

Vol 23:407-12

Shane, Scott. 2008. “The Unstudied Art of Interrogation.” The New York Times,

March 9. http://www.nytimes.com/2008/03/09/weekinreview/09shane.html

Shane, Scott. 2008. “Inside a 9/11 Mastermind’s Interrogation.” The New York Times,

June 22, 2008. http://www.nytimes.com/2008/06/22/world/americas/22iht-

22ksm.13873332.html

Shane, Scott. 2009. “Waterboarding Used 266 Times on 2 Suspects.” The New York

Times, April 20, 2009. http://www.nytimes.com/2009/04/20/world/20detain.html.

April 19, 2009.

Sheehan, Ivan Sascha. 2007. When Terrorism and Counterterrorism Clash:

The War on Terror and the Transformation of Terrorist Activity. Youngstown,

New York: Cambria.

Sherman, L. W. 1993. “Defiance, deterrence, and irrelevance: A theory of the criminal

sanction.” Journal of Research in Crime and Delinquency 30:445–473.

Solomon, S., J. Greenberg, and T. Pyszczynski. 2004. “The cultural animal: Twenty

years of terror management theory and research.” Handbook of experimental

existential psychology 13–34.

Soufan, Ali. 2009. “My Tortured Decision.” The New York Times. April 23, 2009.

http://www.nytimes.com/2009/04/23/opinion/23soufan.html

Stein, Jeff. 2010. “CIA Man Retracts Claim on Waterboarding.” Foreign Policy.

January 26, 2010.

Tajfel, Henri. “Social Psychology of Intergroup Relations.” Annual Review Psychology.

1982. 33:1-39.

Temple-Raston, Dina. 2010. “Terrorism Case Shows Range of Investigators’ Tools.”

National Public Radio. December 15, 2010.

Transactional Records Access Clearinghouse. “National Profile and Enforcement:

Trends Over Time.” 2006. http://trac.syr.edu/tracfbi/newfindings/current/

U.S. Immigration and Customs Enforcement. “Programs: Special Registration.”

http://www.ice.gov/pi/specialregistration/index.htm

United States Senate Select Committee on Intelligence. 2006. “Report on Postwar

Findings about Iraq’s WMD Programs and Links to Terrorism and How they

Compare with Prewar Assessments.” September 8.

Weiser, Benjamin and Colin Moynihan. 2010. “Guilty Plea in Plot to Bomb Times

Square.” The New York Times. June 21, 2010.

Wilkinson, Paul. 2001. Terrorism Versus Democracy : The Liberal State Response.

New York: Routledge.

Zabel, Richard B. and James J. Benjamin, Jr. 2009. “In Pursuit of Justice: Prosecuting

Terrorism Cases in the Federal Courts.” July 2009. Human Rights First.org.

http://www.humanrightsfirst.org/us_law/prosecute/

Zogby, John. 2005. “Statement before the U.S. House of Representatives Committee

on the Judiciary.” Hearing on “Reauthorization of the PATRIOT Act.”

June 10, 2005.

Page 46: COUNTERTERRORISM SINCE 9/11

46

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

ENDNOTES

1 Means employed to block terrorist financing have been applied in overbroad fashion

at times, placing significant burden on Islamic charities. But experts widely support

the goal of denying terrorists money they can use to execute operations.

2 As FBI Special Agent George Venezuelas said in a press conference after Faisal

Shazhad’s failed Times Square bombing attempt: “It’s the tips from the public that

really disrupt these terrorist plots.”

3 There is an ongoing debate about which term is most appropriate for referring to the

loose network of political Islamists employing terrorism against western targets.

Using ‘global jihadists’ offers terrorists their preferred label of ‘holy warriors.’ ‘Al

Qaeda’ is inappropriate in so far as terrorists are not the coherent global organiza-

tion that name implies. Calling disparate terrorists ‘Al Qaeda’ serves to concretize

their narrative power. The term ‘militant Islamists,’ has its own drawbacks. First, lay

audiences often inaccurately link the term directly to Islam as it is peacefully prac-

ticed by hundreds of millions of people around the world, failing to understand that

the term refers to exceedingly rare men and women who violently pursue a funda-

mentalist marriage of Islam and the state called ‘political Islam.’ Second, it is not

clear that every ‘Islamist’ group (violent or not) is really as fundamentalist as they

appear. Many may be using Islamic tropes as a way to voice other (sometimes

democratic or populist) agendas that are formally banned by their relatively authori-

tarian regimes. We choose the term ‘irhabis,’ Arabic for ‘terrorists,’ to refer to

terrorists who kill in the name of (some narrow and distorted interpretation of)

Qu’ran (a text written in Arabic). Researchers might also refer to their struggle not as

‘jihad,’ but as ‘Hirabah,’ Arabic for ‘unholy war.’ For other, appropriate terms, refer to:

http://smallwarsjournal.com/blog/2007/03/words-have-meaning/

4 Brian Michael Jenkins of RAND writes: “The volume of domestic terrorist activity

was much greater in the 1970s than it is today. That decade saw 60 to 70 terrorist

incidents, most of them bombings, on U.S. soil every year—a level of terrorist activ-

ity 15 to 20 times that seen in most of the years since 9/11, even counting foiled

plots as incidents. And in the nine-year period from 1970 to 1978, 72 people died in

terrorist incidents, more than five times the number killed by jihadist terrorists in the

United States in the almost nine years since 9/11” (Jenkins 2010, viii)

5 While at least some of that financial activity has shifted to the traditional, informal,

and difficult-to-trace ‘hawala’ money transfer system, the original crackdown did

result in at least two prosecutions of Al Qaeda financiers, the chilling of support for

Islamic charities that might funnel money to radical Islamists, and later, the prosecu-

tion of scores of many (non-terrorist) hawala bankers in the U.S.

6 The effectiveness of these international efforts is somewhat disputed, but experts on

threat assessment point out that building nuclear, chemical, and biological weapons

is extremely difficult (Mueller and Center 2008; Leitenberg 2005).

7 As part of the USA PATRIOT Act of October, 2001.

8 One of the key problems with information sharing, yet to be fully overcome, stems

from the perverse incentives of the intelligence community, which reward individuals

for marshalling important information at the right time. If the information is broadly

shared before it is clearly valuable, individuals may miss out on opportunities for

praise and promotion. See Lee and Rao (2007) for a thorough discussion of the

causes and effects of inter-agency information sharing.

9 Many have blamed a 'wall' between foreign intelligence investigations and domestic

criminal investigations for the FBI's pre-9/11 failure to attain search and surveillance

warrants for Zacarias Moussaoui. They argue that the Office of Intelligence Policy

Review (OIPR) under Janet Reno's DOJ laid the foundation for that 'wall' in a series

of bureaucratic memos that held little official weight but confused FBI officials seek-

ing to remain on the proper side of FISA's "primary purpose" clause. However,

others have persuasively argued that the "wall" debate was motivated by FBI offi-

cials' desires to excuse what was actually a failure to recognize the threat posed by

Moussaoui. FISA warrants have been famously easy to obtain, even with the over-

sight of OIPR. Thousands have been approved since 1978 while only a handful

have been denied. And the evidence FBI field agents had acquired on Moussaoui at

the time would have been sufficient for a Title III or FISA warrant. It appears,

instead, that FBI headquarters, in rejecting the Minneapolis field office's request to

file a warrant application, simply failed to recognize the threat Moussaoui posed.

10 In “Ordinary Measures Extraordinary Results,” Difo shows that controversial CT

tactics have been used in only a small number of cases. Our closer analysis of

those particular cases shows that the techniques were not in fact decisive for their

outcomes.

11 It is possible that secret FISA or NSA surveillances were used in these or other

investigations that resulted in foiled plots. However, there is little reason to believe

that the post-9/11 changes to FISA would have made a difference in the course or

outcome of these investigations. After 9/11, FISA language was altered to require

that a "significant purpose" of a FISA surveillance was the gathering of foreign intel-

ligence instead of the "primary purpose." Despite the change in language, though,

federal courts have rejected opportunities to distinguish between the two standards

(see U.S.A. v. Stewart, re Sealed Case, and U.S.A. v. Abu Jihaad for examples of

post-FISA-amendment case law). Furthermore, FISA courts (FISCs) have continued

to approve nearly all FISA applications with little or no objection. Thus, for all practi-

cal purposes FISA operates the same now as it did pre-PATRIOT. There is no public

evidence describing the use of warrantless NSA surveillances in any of the investi-

gations that resulted in foiled plots. We address NSA's programs below, but also

note here that many of their surveillances appear to entirely duplicate FISA's func-

tion while avoiding the oversight of any external body (e.g. FISC). There is ample

reason to believe that such low or non-exitstent evidentiary standards for pursuing

such surveillances result in the pursuit of weak leads and the collection of informa-

tional noise that may distract investigators from terrorist signals.

12 Both the 9th and 2nd District Courts ruled in U.S. v. Freitas (1988) and U.S. v. Ville-

gas (1990), respectively, that ‘delayed notification’ searches were permissible in

cases where probable cause was evident and notification of the search would have

disallowed investigators from gathering the evidence they needed to build their

cases. So-called “sneak and peek” privileges were appended to standard probable

cause warrants and constitutionally validated in several subsequent drugs cases.

The PATRIOT ACT merely formalized these rules.

13 The state has long encouraged police to be discerning about who they would inves-

tigate and how aggressively they would pursue evidence. It was common law

practice, in the Anglo-American tradition, that a constable would punish a person for

‘trespass’ if his allegations compelled the constable to enter the home of some inno-

cent third party. This practice prevented the wasting of the constable’s time with

pointless investigations and protected his own reputation as someone who did not

frivolously and unfairly breach the sanctity of the home (Kaplan 1961). As states

bureaucratized and modernized their police forces, they placed similar restrictions

on their own investigators to ensure that they did not waste their time pursuing

unsubstantiated allegations. Thus the professionalizing police forces of the 18th and

19th centuries were usually required to seek permission from a ‘magistrate judge’

before surveilling a person, searching his private belongings, or seizing any of his

property. The U.S. Constitution reflected these emerging norms and citizens’ expec-

tations about their privacy in the Fourth Amendment.

14 NSLs had been used before the PATRIOT Act but only against targets or subjects

of an ‘authorized investigation’ into violent criminality or terrorism. The PATRIOT

Act and a redefinition of the parameters of NSL-usage by then Attorney General,

John Ashcroft, has expanded their use for even ‘preliminary inquiries’ into American

citizens who have not been implicated in criminal or terrorist activity by probable

cause evidence.

15 http://www.ice.gov/pi/specialregistration/index.htm

16 Like any security measure, full-body scanners are imperfect and may not detect

weapons hidden in body cavities. They do, however, increase the burden of opera-

Page 47: COUNTERTERRORISM SINCE 9/11

47

tionalizing terrorist weapons while denying terrorists an easy second-tier security

screening.

17 In seeking to offer and present a dispassionate evaluation of security measures’ effi-

cacy, we choose to avoid the use of the term ‘torture,’ which bears more legal and

moral connotation than we wish to consider here.

18 The Department of Defense undertook its own parallel coercive interrogation regime

that resulted in at least a dozen deaths and the infamous abuses of Abu Ghraib

detainees. The DOD regime is widely regarded as a failure. So, for the sake of clar-

ity and charitable inquiry, here we only evaluate the coercive interrogation regime

authorized by the Bush Administration and used by the CIA - an interrogation regime

still advocated by some.

19 These ten are addressed in Bybee’s memos to both the CIA General Counsel and

the White House Counsel. For more details on each method, see pages 2-4 of

either memo (available at http://www.aclu.org/accountability/olc.html).

20 On FOX News broadcast of “The Sean Hannity Show”. April 2009

21 Jose Padilla may have suffered these effects after his extended period of isolation

and sensory disorientation.

22 Muhammad Khatani, under the duress of sleep-deprivation and sensory disorienta-

tion, for instance, reported that thirty of his fellow Guantanamo detainees had been

bodyguards for Osama bin Laden, charges that he later recanted and most experts

agree were false.

23 http://www.politifact.com/truth-o-meter/statements/2010/feb/12/barack-

obama/obama-claims-bush-administration-got-190-terrorism/

24 The sheer quantity of prosecutions and convictions is not a clear indicator of suc-

cess or failure. There was an overuse of “terrorism-related” charges after 9/11 that

may have distracted investigators and prosecutors from the most important cases.

Of the 190 terrorism federal court prosecutions related to irhabi movements, fewer

than a dozen stemmed from serious terrorism incidents. But those who believe that

“experience is the best teacher” might prefer the more experienced Article III courts

for terrorism cases.

25 For instance, while severely sleep deprived and disoriented, Muhammed Khatani

accused thirty separate Guantanamo inmates of being Osama bin Laden’s

bodyguard.

26 Bin Laden’s driver, Salim Hamdan, was sentenced to 5 years and 6 months in mili-

tary commission for offering material support to a terrorist organization, while Ali

Asad Chandia was convicted for the same crime and sentenced to 15 years by a

civilian court. David Hicks, tried by military tribunal for crimes very similar to those of

John Walker Lindh, was sentenced to 7 years in prison. Lindh, prosecuted in a civil-

ian court was sentenced to 20 years. (See Center for American Progress Report:

“Criminal Courts are Tougher on Terrorists than Military Detention”)

27 For more on CIPA, see http://fas.org/sgp/crs/secrecy/89-172.pdf

ENDNOTES

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Page 48: COUNTERTERRORISM SINCE 9/11

¢ CT EVALUATION

Alhomayed, Tariq. 2010. “Combating Al Qaeda Means Protecting Islam.” Asharq

Alawsat Newspaper, January 11 2010.

(http://aawsat.com/english/news.asp?section=2&id=19479)

Art, Robert and Louise Richardson, Eds. 2007. Democracy and Counter-Terrorism:

lessons from the past. Washington D.C.: United States Institute of Peace Press.

Bellingham, Trevor. 2008. New Topics on Terrorism, Counter-Terrorism, and

Preparedness. New York: Nova Science Publishers.

Charters, David. 1994. The Deadly Sin of Terrorism: Its Effect on Democracy and Civil

Liberty in Six Countries. Westport Conn.: Greenwood Press.

Cole, David. 2007 “Government Counter-Terrorism Report Card 2003.” Los Angeles

Times. November 18, 2007. (http://www.stat.cmu.edu/~brian/lost/2007-11-19-la-

times.pdf) (Accessed January 21, 2011.)

Cole, David. 2008. “The Brits Do It Better.” The New York Review of Books 55.

(http://www.nybooks.com/articles/21513)

Crenshaw, Martha. 2009. “Evaluating the Effectiveness of Counter-Terrorism.” Prepared

for the International Studies Association 50th Annual Convention, New York,

New York, February 15-18, 2009.

Cronin, Audrey. 2009. How Terrorism Ends: Understanding the Decline and Demise of

Terrorist Campaigns. Princeton: Princeton University Press.

Donohue, Laura. 2008. The Cost of Counter-Terrorisms Power, Politics, and Liberty.

Cambridge; New York: Cambridge University Press.

Enders, W., T. Sandler, and J. Cauley. 1990. “Assessing the Impact of Terrorist-

Thwarting Policies: An Intervention Time Series Approach.” Defense and Peace

Economics 2:1–18.

Government Accountability Office. 2008. “GAO-08-336. Combating Terrorism: State

Department’s Antiterrorism Program Needs Improved Guidance and More

Systematic Assessments of Outcomes.” Washington, D.C.

Halkides, Mihalis. 1995. “How Not to Study Terrorism.” Peace Review: A Journal of

Social Justice 7:253.

Hewitt, Christopher. 1984. The Effectiveness of Anti-terrorist Policies. Lanham:

University Press of America.

Kennedy, L. W., and C. M. Lum. N.D. “Developing a Foundation for Policy Relevant

Terrorism Research in Criminology. 2003.” Rutgers University: New Brunswick.

Keohane, D. 2005. The EU and Counter-Terrorism. Centre for European Reform.

http://www.cer.org.uk/pdf/wp629_terrorist_counter_keohane.pdf

LaFree, G., and L. Dugan. 2007. “Introducing the Global Terrorism Database.” Terrorism

and Political Violence 19:181–204.

Lum, Cynthia, Leslie Kennedy, and Alison Sherley. 2006. “Are Counter-Terrorism

Strategies Effective? The Results of the Campbell Systematic Review of

Counter-Terrorism Evaluation Research.”

Schmid, Alex P. and Ronald Crelinsten, eds. 1993. Western Responses to Terrorism.

London: Frank Cass Publishers.

Sheehan, Ivan Sascha. 2007. When Terrorism and Counter-Terrorism Clash: The War

on Terror and the Transformation of Terrorist Activity. Youngstown, New York:

Cambria.

Silke, A. 2001. “The Devil You Know: Continuing Problems with Research on Terrorism.”

Terrorism and Political Violence 13:1.

Urquhart, Brian. 2004. “A Matter of Truth.” The New York Review of Books.

(http://www.nybooks.com/articles/17092)

Wilkinson, Paul. 2001. Terrorism Versus Democracy: The Liberal State Response.

New York: Routledge.

48

EXTENDED BIBL IOGRAPHY

¢ CT STRATEGY AND CONTEXT OF CT TACTICS

Abrahms, M. 2008. “What Terrorists Really Want: Terrorist Motives and Counter-

Terrorism Strategy.” International Security 32:78–105.

Arquilla, John, and D. F Ronfeldt. 2001. Networks and Netwars: The Future of Terror,

Crime, and Militancy. RAND Corp.

Arquilla, John. 2008. Worst Enemy: The Reluctant Transformation of the American

Military. Ivan R. Dee. Washington D.C.: United States Institute of Peace Press.

Asharq Alawsat. 2010. “Al-Qaeda Appeals to Sympathizers for Donations.” August 12,

2010. (http://www.asharq-e.com/news.asp?section=1&id=21931)

Aslan, Reza. “The Taliban PR Push.” The Daily Beast, July 30 2009.

(http://www.thedailybeast.com/blogs-and-stories/2009-07-30/the-taliban-pr-push/)

Atran, Scott. 2003. “Genesis of Suicide Terrorism.” Science 299:1534-1539.

Baker, W. E, and R. R Faulkner. 1993. “The Social Organization of Conspiracy: Illegal

Networks in the Heavy Electrical Equipment Industry.” American Sociological

Review 58:837–860.

Benson, Pam. 2010. “Homegrown Terrorist Threat to be Part of National Security

Strategy CNN.com.”

(http://www.cnn.com/2010/POLITICS/05/27/homegrown.terror/index.html)

Bergen, Peter and Paul Cruickshank. 2008. The Unraveling. The New Republic. June

11. (http://www.tnr.com/article/the-unraveling-0) (Accessed January 25, 2011)

Bjelopera, Jerome and Mark Randol. 2010. “American Jihadist Terrorism: Combating

a Complex Threat.” Congressional Research Service. Washington D.C.

December, 7.

Blair, Dennis. 2009. “The National Intelligence Strategy of the United States of

America.” (http://www.dni.gov/reports/2009_NIS.pdf)

Bobbitt, Philip. 2008. Terror and Consent: The Wars for the Twenty-First Century.

1st ed. New York: A.A. Knopf.

Bolz, Frank. 2002. The Counter-Terrorism Handbook: Tactics, Procedures, and

Techniques. 2nd ed. Boca Raton: CRC Press.

Breinholt, J. 2008. “Misperceptions and Misrepresentations about US Counter-Terrorism

Efforts.” Wake Forest Law Review. 43:627.

Brzezinski, Zbigniew. “Terrorized by ‘War on Terror’.” The Washington Post

(http://www.washingtonpost.com/wp-

dyn/content/article/2007/03/23/AR2007032301613.html)

Brzezinski, Zbigniew. 2007. Second Chance: Three Presidents and the Crisis of

American Superpower. New York: Basic Books.

Chivers, Daniel H. and Jonathan S. Snider. “International Nuclear Forensics Regime.”

Security for a New Century, Henry L. Stimson Center

(http://www.armscontrol.org/act/2008_07-08/NuclearForensics)

Clarke, Richard. 2004. Against All Enemies: Inside America’s War on Terror.

Free Press.

Clausewitz, Carl. 1976. On War. Princeton N.J.: Princeton University Press.

Coll, Steve. 2005. Ghost Wars: The Secret History of the CIA, Afghanistan, and

Bin Laden, from the Soviet Invasion to September 10, 2001. New York NY:

Penguin Books.

Congressional Committee Prints. 2008. CMP-2008-DPC-0115. Democrats Have

Consistently Kept Our Focus on Afghanistan and Al Qaeda. July 31. LexisNexis

Congressional Research Digital Collection.

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

Page 49: COUNTERTERRORISM SINCE 9/11

49

EXTENDED B IB L I OGRAPHY

Congressional Committee Prints. 2009. CMP-2009-DPC-0130. President Obama

Outlined a Strategy for Afghanistan and Pakistan To Deny Al Qaeda Safe Haven

and Reverse Taliban Momentum. December 7. LexisNexis Congressional

Research Digital Collection.

Congressional Committee Prints. 2009. CMP-2009-GAO-0420. Interagency

Collaboration: Key Issues for Congressional Oversight of National Security

Strategies, Organizations, Workforce, and Information Sharing. September 2009.

LexisNexis Congressional Research Digital Collection.

Congressional Committee Prints. 2010. CMP-2010-DPC-0008. Making Real Progress in

Our Mission To Disrupt, Dismantle and Defeat Al Qaeda. February 11.

LexisNexis Congressional Research Digital Collection.

Congressional Committee Prints. 2010. CMP-2010-DPC-0126. Obama Administration Is

Leading a Tough, Smart Fight To Confront Global Terrorist Threats and Keep

America Safe. October 5. LexisNexisCongressional Research Digital Collection.

Congressional Hearing. 2001. HRG-2001-ASH-0005. U.S. National Security Strategy

and the Quadrennial Defense Review. June 21. LexisNexis Congressional

Hearings Digital Collection.

Congressional Hearing. 2001. HRG-2001-ASH-0015. U.S. National Security Strategy.

March 21. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2002. HRG-2002-ASH-0019. House Intelligence Committee

Report on Counterterrorism Intelligence Capabilities and Performance Prior to

9/11. September 5. LexisNexis

Congressional Hearing. 2002. HRG-2002-BHU-0018. Financial War on Terrorism and

the Administration’s Implementation of Title III of the USA PATRIOT Act.

January 29. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2002. HRG-2002-FOR-0003. New Strategic Framework:

Implications for U.S. Security. February 6. LexisNexis Congressional Hearings

Digital Collection.

Congressional Hearing. 2003. HRG-2003-HFS-005239. Progress Since 9/11:

The Effectiveness of the U.S. Anti-Terrorist Financing Efforts. March 11.

LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2004. HRG-2004-HGR-0030. Effective Strategies Against

Terrorism. February 3. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2004. HRG-2004-ISS-0007. Intelligence Community Reform.

July 20. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2004. HRG-2004-SGA-0076. Voicing the Need for Reform:

The Families of 9/11. August 17. LexisNexis Congressional Hearings

Digital Collection.

Congressional Hearing. 2006. HRG-2006-SJS-0019. Examination of the Call To

Censure the President. March 31. LexisNexis Congressional Hearings

Digital Collection.

Congressional Hearing. 2007. HRG-2005-HIR-0130. U.S. Counterterrorism Strategy

Update. October 27. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2007. HRG-2007-CGR-0084. Six Years Later: Assessing Long-

Term Threats, Risks and the U.S. Strategy for Security in a Post-9/11 World.

October 10. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2007. HRG-2007-CGR-0086. Six Years Later (Part II):

Smart Power and the U.S. Strategy for Security in a Post-9/11 World.

November 6. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2008. HRG-2008-CGR-0082. Six Years Later (Part III):

Innovative Approaches to Combating Terrorists. February 14. LexisNexis

Congressional Hearings Digital Collection.

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Congressional Hearing. 2009. HRG-2009-ASH-0021. Project on National Security

Reform: Commentary and Alternative Views. March 19. LexisNexis

Congressional Hearings Digital Collection.

Congressional Hearings Digital Collection.Committee on Intelligence. 2003. CIS-NO:

2003-S423-3. Joint Inquiry into Intelligence Community Activities Before and

After the Terrorist Attacks of Sept. 11, 2001. CIS-DATE: 2003, SOURCE:

Committee on Intelligence, Select.

Congressional Research Service. 2005. CRS-2005-FDT-0235. Intelligence Community

Reorganization: Potential Effects on DOD Intelligence Agencies. February 11.

LexisNexis Congressional Research Digital Collection.

Congressional Research Service. 2008. CRS-2008-FDT-1301. National Security

Strategy: Legislative Mandates, Execution to Date, and Considerations for

Congress. December 15. LexisNexis Congressional Research Digital Collection.

Department of Homeland Security. 2007. Homeland Security Progress on 9/11

Commission Recommendations. September 2007.

(http://www.dhs.gov/xabout/gc_1168618952015.shtm) (Accessed January 25,

2011)

Doherty, Patrick. “Homeland Security, Counter-Terrorism, and Strategic Resilience.”

April 2010. Counter-Terrorism Strategy Initiative, New America Foundation.

Flynn, S. 2004. America the Vulnerable: How Our Government is failing to protect us

from Terrorism. Harper Collins.

Friedman, Benjamin. 2010. Terrorizing Ourselves: Why U.S. Counter-Terrorism Policy is

failing and how to fix it. Washington D.C.: Cato Institute.

Government Accountability Office. 2003. “GAO-04-325T. Homeland Security:

Preliminary Observations on Efforts to Target Security Inspections of Cargo

Containers.” Washington, D.C.

Government Accountability Office. 2004. “GAO-04-408T. Combating Terrorism:

Evaluation of Selected Characteristics in National Strategies Related to

Terrorism.” Washington, D.C.

Government Accountability Office. 2004. “GAO-04-501T. Combating Terrorism: Federal

Agencies Face Continuing Challenges in Addressing Terrorist Financing and

Money Laundering”. Washington, D.C.

Government Accountability Office. 2004. “GAO-04-591. Homeland Security: Selected

Recommendations from Congressionally Chartered Commissions and GAO.”

Washington, D.C.

Government Accountability Office. 2007. “GAO-07-398T. Homeland Security:

Management and Programmatic Challenges Facing the Department of

Homeland Security.” Washington, D.C.

Government Accountability Office. 2007. “GAO-08-126T. Maritime Security: The SAFE

Port Act: Status and Implementation One Year Later.” Washington, D.C.

Government Accountability Office. 2008. “GAO-08-329T. Border Security: Despite

Progress Weaknesses in Traveler Inspections Exist at Our Nation’s Ports of

Entry.” Washington, D.C.

Government Accountability Office. 2008. “GAO-08-508T. Secure Border Initiative:

Observations on the Importance of Applying Lessons Learned to Future

Projects.” Washington, D.C.

Grewe, Barbara. “Legal Barriers to Information Sharing: The Erection of a Wall Between

Intelligence and Law Enforcement Investigations.” 9/11 Commission Staff

Monograph. 2004.

Hanzhang, General Tao, and Tao Hanzhang. 2007. Sun Tzu’s Art of War: The Modern

Chinese Interpretation. Sterling Innovation.

Page 50: COUNTERTERRORISM SINCE 9/11

Hayden, General Michael V. 2010. Protecting America and Winning the Intelligence

War. Heritage Lectures. May 26. (http://report.heritage.org/hl1167) (Accessed

January 25, 2011)

Hoffman, B. 2005. Does Our Counter-Terrorism Strategy Match the Threat? RAND

Corp. Santa Monica, CA.

Hoffman, Bruce. 2009. “A Counter-Terrorism Strategy for the Obama Administration.”

Terrorism and Political Violence 21:359.

Jenkins, Brian Michael. 2010. Would-be Warriors: Incidents of Jihadist Terrorist

Radicalization in The United States Since September 11, 2001. The Rand

Corporation.

Kean, T. H, and H. H Lee. 2004. 9/11 Commission Report: Final Report Of The National

Commission On Terrorist Attacks Upon The United States. 2004. New York:

WW Norton.

Kirk, Michael. 2008. “Bush’s War.” PBS: Frontline. March 25.

Larsen, Randall. 2007. Our Own Worst Enemy: Asking The Right Questions About

Security to protect you, your family and America. 1st ed. New York N.Y.:

Warner Books.

Lee, J. K, and H. R Rao. 2007. “Exploring the Causes and Effects of Inter-Agency

Information Sharing Systems Adoption in the Anti/Counter-Terrorism and

Disaster Management Domains.” P. 163 in Proceedings of the 8th Annual

International Conference on Digital Government Research: Bridging Disciplines

& Domains: Digital Government Society of North America. Pg. 155-163.

Leitenberg, Milton. 2005. “Assessing the Biological Weapons and Bioterrorism Threat.”

Center for Security Studies of the Swill Federal Institute of Technology. Zurich.

ISBN 1-58487-221-7

Levitt, Matthew. 2008. “Al-Qa’ida’s Finances: Evidence of Organizational Decline?”

CTC Sentinel. Combating Terrorism Center: West Point.

(http://www.meforum.org/2579/syria-financial-support-jihad)

“McChrystal: We’ve Shot ‘An Amazing Number’ Of Innocent Afghans.” April 2, 2010.

The Huffington Post. April 2 2010.

(http://www.huffingtonpost.com/2010/04/02/mcchrystal-weve-shot-an-

a_n_523749.html)

McConnel, J.M. 2007. “The National Counter-Intelligence Strategy of the United

States.” (http://www.dni.gov/reports/NCIX_Strategy_2007.pdf)

McConnel, J.M. 2007. “An Overview of the National Intelligence Community.”

(http://www.dni.gov/who_what/061222_DNIHandbook_Final.pdf)

McConnel, J.M. 2008. “Vision 2015: A Globally Networked and Integrated Intelligence

Enterprise.” (http://www.dni.gov/reports/Vision_2015.pdf)

McCulloch, J., and B. Carlton. 2005. “Preempting Justice: Suppression of Financing

of Terrorism and the War on Terror.” Current Issues Crim. Just. 17:397.

“Media Round-Up: Executive Orders and Retired Military Leaders.” January 23, 2009.

HumanRightsFirst.org. (http://www.humanrightsfirst.org/2009/01/23/media-round-

up-executive-orders-and-retired-military-leaders/)

Mueller, J., and M. Center. 2008. “The Atomic Terrorist: Assessing the Likelihood.”

Program on International Security, University of Chicago. Chicago, IL 15.

Naftali, Timothy. 2006. Blind Spot: The Secret History of American Counter-Terrorism.

New York: Basic Books.

Office of the Director of National Intelligence. 2005. “The National Intelligence Strategy

of the United States of America.”

(http://www.dni.gov/publications/NISOctober2005.pdf)

50

Office of the Director of National Intelligence. 2006. “Report on the Progress of the

Director of National Intelligence in Implementing the “Intelligence Reform and

Terrorism Prevention Act of 2004”.” (http://www.dni.gov/reports/CDA_14-25-

2004_report.pdf)

Office of the Director of National Intelligence. 2009a. “An Overview of the U.S.

Intelligence Community for the 111th Congress.”

(http://www.dni.gov/overview.pdf)

Office of the President. 2006. The National Security Strategy of the United States of

America.

Office of the President. 2006. The National Strategy for Combating Terrorism.

(http://hosted.ap.org/specials/interactives/wdc/documents/wh_terror060905.pdf)

Office of the President. 2010. The National Security Strategy of the United States

of America.

(www.whitehouse.gov./sites/default/files/rss_viewer/national_strategy.pdf)

Accessed January 2011.

Posen, B. R. 2002. “The Struggle against Terrorism: Grand Strategy, Strategy,

and Tactics.” International Security 26:39–55.

Priest, Dana and William Arkin. 2010. “Top Secret America.” Washington Post.

July 19-21, 2010. (http://projects.washingtonpost.com/top-secret-america/)

Rowley, Coleen and members of the Veteran Intelligence Professionals for Sanity.

“How Not to Counter Terrorism.” June 18, 2007. WarIsACrime.org.

(http://www.afterdowningstreet.org/?q=node/23755)

Scahill, Jeremy. 2010. Killing Reconciliation. The Nation. October 27.

(http://www.thenation.com/article/155622/killing-reconciliation) (Accessed

January 25, 2011)

Sheehan, Michael. 2008. Crush the Cell: How to Defeat Terrorism Without Terrorizing

Ourselves. 1st ed. New York: Crown Publishers.

Smith, R. 2008. The Utility of Force: The Art of War in the Modern World.

Vintage Books USA.

¢ FOILED TERROR PLOTS AND‘RADICALIZATION’

ABC News. 2009. “Alleged Dallas Bomb Plot Trial Set for June.” November 25.

(http://abclocal.go.com/ktrk/story?section=news/state&id=7138727)

Abramson, Larry, Maria Godoy, and Katie Gradowski. 2005. The Patriot Act: Justice

Department Claims Success.” NPR. March, 4.

http://www.npr.org/templates/story/story.php?storyId=4756706

Bailey, Eric. 2007. “Lodi Man Gets 24 Years in Terrorism Case.” Los Angeles Times.

September, 11. http://articles.latimes.com/2007/sep/11/local/me-lodi11

BBC. 2009. “Sears Tower Bomb Plot Leader Narseal Batiste Jailed.” November 20.

(http://news.bbc.co.uk/2/hi/8371671)

Belluck, Pam. 2003. “Threats and Responses: The Bomb Plot; Unrepetant Shoe

Bomber is Given a Life Sentence for Trying to Blow up Jet.” The New York

Times. January, 31. http://www.nytimes.com/2003/01/31/us/threats-responses-

bomb-plot-unrepentant-shoe-bomber-given-life-sentence-for.html

Bjelopera, Jerome and Mark Randol. 2010. “American Jihadist Terrorism:

Combating a Complex Threat.” Congressional Research Service. Washington

D.C. December, 7.

Bloomberg. 2003. “U.S. Officials Arrest 8 in ‘Virginia Jihad Network.’” Bloomberg.

June, 27.

http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aff9sXPzxHyk

&refer=us

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

EXTENDED B IB L I OGRAPHY

Page 51: COUNTERTERRORISM SINCE 9/11

51

CBS News. 2009. “Jordanian Indicted in Dallas Bomb Plot.” October 8.

(http://www.cbsnews.com/stories/2009/10/08/national/main5371726.shtml)

CBS News. 2006. “Penn. Man Named in Alleged Terror Plot.” February 11.

CBS News. 2007. “Terror Suspect Pleads Guilty to Mall Attack Plot.” November 28.

(http://cbs2chicago.com/local/derrick.shareef.cherryvalle.2.597906.html)

CNN. 2006. “FBI: Three Held in New York Tunnel Plot.” July 7.

(http://www.cnn.com/2006/U.S./07/07/tunnel.plot/index.html)

CNN. 2010. “Airplane Bomb Suspect Pleads Not Guilty.” January 8.

(http://www.cnn.com/2010/CRIME/01/08/terror.hearing/index.html)

Cristina Corbin. 2009. “Patriot Act Likely Helped Thwart NYC Terror Plot, Security

Experts Say.” http://www.foxnews.com/politics/2009/05/21/patriot-act-likely-

helped-thwart-nyc-terror-plot-security-experts-say/ (Accessed January 20, 2011).

Department of Homeland Security, Press Release. 2009. “Liberty City Defendants

Sentenced to Federal Prison on Terror-Related Charges.” November 20.

(http://www.ice.gov/pi/nr/0911/091120miami.htm)

Department of Justice Press Release. 2010. “Man who Formed Terrorist Group that

Plotted Attacks on Military and Jewish Facilites Sentenced to 16 Years in

Federal Prison.” March 6.

(http://losangeles.fbi.gov/dojpressrel/pressrel09/la030609ausa.htm)

Department Of Justice, Press Release. 2009. “Ohio Man Sentenced to 20 years for

Terrorism Conspiracy to Bomb Targets in Europe and the United States.”

February 26. (http://www.justice.gov/usao/ohs/Press/02-26-09-DOJ.pdf)

Department of Justice, Press Release. 2010. “Najibullah Zazi Pleads guilty to

Conspiracy to Use Explosives Against Persons or Property in U.S., Conspiracy

to Murder Abroad, and Providing Material Support to Al-Qaeda.” February 22.

(http://www.justice.gov/opa/pr/2010/February/10-ag-174.html)

Department of Justice, Press Release. 2010. “Zarein Ahmedzay Pleads Guilty to Terror

Violations in Connection with Al-Qaeda New York Subway Plot.” April 23.

(http://www.justice.gov/opa/pr/2010/April/10-ag-473.html)

Department of Justice. 2007. “Hamid Hayat Sentenced to 24 Years in Connection with

Terrorism Charges.” Washington, D.C. September, 10.

http://www.justice.gov/opa/pr/2007/September/07_nsd_700.html

Dienst, Jonathan. 2009. “FBI, NYPD Arrest 4 in Alleged Plot to Bomb NY Synagogues.”

NBC New York. May 2009. (http://www.nbcnewyork.com/news/local-beat/FBI-

Bust-Plot-Foiled.html)

Difo, Germain. “Ordinary Measures, Extraordinary Results: As Assessment of Foiled

Plots Since 9/11.” May 2010. American Security Project.

Dreihaus, Bob. 2007. “U.S. Indicts an Ohio Man in Terror Conspiracy Case.”

New York Times. April 13, 2007.

Erickson, Kurt. 2009. “Trial Delayed to Determine Alleged Bomber’s Fitness.”

Herald-Review.com. December 22.

Federal Bureau of Investigation. 2003. “Two Defendants in ‘Portland Cell’ Plead Guilty

to Conspiracy to Contribute Services to the Taliban, Federal Weapons Charges.”

Washington, D.C. September, 18. http://www.fbi.gov/news/pressrel/press-

releases/two-defendants-in-portland-cell-case-plead-guilty-to-conspiracy-to-

contribute-services-to-the-taliban-federal-weapons-charges

Fiaola, Anthony and Steven Mufson. 2007. “N.Y. Airport Target of Plot, Officials Say.”

Washington Post. June 3, 2007. (http://www.washingtonpost.com/wp-

dyn/content/article/2007/0602/AR2007060200606.html)

File, Thom and Sarah Crissey. 2010. Voting and Registration in the Election of

November 2008: Population Characteristics. U.S. Census Bureau. May 2010.

(http://www.census.gov/hhes/www/socdemo/voting/index.html) (Accessed

January 25, 2011)

Fox News. 2009. “Four Suspects in New York Terror Plot Plead Not Guilty.” June 3.

(http://www.foxnews.com/story/0,2933,525009,00.html)

Fox Toledo News. 2008. “Informant: Terror Suspects Sought Him.” May 10.

(http://www.foxtoledo.com/dpp/news/Informant_Terror_Suspects_Sought_Him)

Gendar, Alison and Bill Hutchinson. 2009. “Assem Hammoud, Suspect in Alleged

New York Tunnels Plot, Released on Bail in Lebanon.” New York Daily News,

March 18. (http://www.nydailynews.com/news/national/2009/03/17/2009-03-

17_assem_hammoud_suspect_in_alleged_new_yor.html)

Goodnough, Abby and Liz Robbins. 2009. “Mass. Man Arrested in Terrorism Case.”

October 21. (http://www.nytimes.com/2009/10/22/us/22terror.html)

Goodnough, Abby, and Scott Shane. 2007. “Padilla Is Guilty on All Charges in Terror

Trial.” The New York Times, August 17

http://www.nytimes.com/2007/08/17/us/17padilla.html (Accessed January 20,

2011).

Horowitz, Craig. “Anatomy of a Foiled Terrorist Plot.” New York Magazine. May, 21.

http://nymag.com/nymetro/news/features/10559/

Hosenball, Mark, Michael Isikoff, and Evan Thomas. 2010. “The Radicalization of

Umar Farouk Abdulmutallab.” Newsweek. January 2.

(http://www.newsweek.com/id/229047/page/1)

Jeffrey, Terrence. 2006. “Terrorist Blamed his Failure on Bush.” Human Events.

February 10. http://www.humanevents.com/article.php?id=12329

Jenkins, Brian Michael. 2010. Would-be Warriors: Incidents of Jihadist Terrorist

Radicalization in The United States Since September 11, 2001. The Rand

Corporation.

Johnson, Dirk. 2009. “Suspect in Illinois Bomb Plot ‘Didn’t Like America Very Much’.”

New York Times. March 27.

(http://www.nytimes.com/2009/09/28/us/28springfield.html?_r=1)

Johnson, Dirk. 2009. “Two Men Accused in Alleged Bomb Plots in Illinois, Texas.”

September 25. (http://www.chicagotribune.com/news/nationworld/la-na-terror-

illinois25-2009sep25,0,1761634.story)

Johnson, Kevin. 2009. “Alleged Terror Threat Seem as ‘Most Serious’

Since 9/11 Attacks.” USA Today. September 25.

(http://www.usatoday.com/news/nation/2009-09-24-terror-probe_N.htm)

Knickerbocker, Brad. “‘Jihad Jane’ joins growing list of American terror suspects.”

Christian Science Monitor, March 12, 2010.

(http://www.csmonitor.com/USA/2010/0312/Jihad-Jane-joins-growing-list-of-

American-terror-suspects)

Leinwand, Donna and Jack Kelley. 2002. “U.S. Citizen Arrested in ‘Dirty Bomb’ Plot.”

USA Today. June, 11.

Lichtblau, Eric and Monica Davey. 2003. “Threats and Responses: Terror; Suspect

in Plot on Bridge Drew Interest Earlier.” The New York Times. June, 21.

http://www.nytimes.com/2003/06/21/us/threats-and-responses-terror-suspect-in-

plot-on-bridge-drew-interest-earlier.html

Liptak, Adam. 2007. “Spying Program May be Tested by Terror Case.” The New York

Times. August, 26. http://www.nytimes.com/2007/08/26/us/26wiretap.html

McCauley, Clark, and Sophia Moskalenko. 2008. “Mechanisms of Political

Radicalization: Pathways Toward Terrorism.” Terrorism and Political Violence

20:415.

EXTENDED B IB L I OGRAPHY

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Page 52: COUNTERTERRORISM SINCE 9/11

McCormack, William. 2009 “State and Local Law Enforcement: Contributions to

Terrorism Prevention.” FBI Law Enforcement Bulletin. March.

http://www2.fbi.gov/publications/leb/2009/march2009/terrorism.htm

McNeill, Jena B. and James Carafano. 2009. “Terrorist Watch: 23 Plots Foiled Since

9/11. Heritage Foudnation. July 2.

http://www.heritage.org/research/reports/2009/07/terrorist-watch-23-plots-foiled-

since-9-11

Merley, Steven. 2009. “The Muslim Brotherhood in the United States.” Hudson Institute

http://www.currenttrends.org/docLib/20090411_Merley.USBROTHERHOOD.pdf

Montgomery, Leigh and Elizabeth Ryan. 2009. “Terrorist Plots Uncovered in the U.S.

Since 9/11.” Christian Science Monitor. September 26.

http://www.csmonitor.com/USA/2009/0926/p02s08-usgn.html

MSNBC. 2009. “U.K. Airline Bomb Plot Ringleader Gets 40 Years.” April 26.

(http://www.msnbc.msn.com/id/32838860)

“NEFA - The Philly Meeting of the Muslim Brotherhood.”

(http://www1.nefafoundation.org/miscellaneous/93Phillyfinal.pdf)

New York Times. 2009. “Trans-Atlantic-Aircraft Plot.” September 14.

(http://topics.nytimes.com/top/reference/timestopics/subjects/t/terrorism/200

6_transatlantic_aircract_plot/index.html?scp=1&sq=liquid%20explosives%20

plot&st=cse)

Peck, Christian W. 2004. Muslims in the American Public Square: Shifting Political

Winds & Fallout from 9/11, Afghanistan, and Iraq. Zogby International.

October 2004.

Raddatz, Martha and Nick Schifrin. “Pakistan Arrests American Al Qaeda Member, But

Identity Not Confirmed.” March 7, 2010. American Broadcasting Company News.

(http://abcnews.go.com/Politics/american-al-qaeda-arested-gadahn-pakistan-

official/story?id=10035076)

Rashbaum, William K. 2010. “After Months of Scrutiny in Zazi Terrorism Case, Two

Arrest Came As A Surprise.” New York Times. January 8.

(http://www.nytimes.com/2010/01/09/nyregion/09zazi.html?pagewanted=1)

Rotella, Sebastian. “U.S. Sees Homegrown Muslim Extremism as Rising Threat.”

December 7, 2009. Los Angeles Times. (http://www.latimes.com/news/nation-

and-world/la-na-us-radicalization7-2009dec07,0,2042129,print.story)

Roy, O. 2008. Al Qaeda in the West as a Youth Movement: The Power of Narrative.

MICROCON Policy Working Paper 2, Brighton: MICROCON.

(http://www.esocialsciences.com/data/articles/Document12212009340.5353662.p

df) (Accessed January 25, 2011.)

Rummel, David, Lowell Bergman, and Matthew Purdy. 2003. “Chasing the Sleeper

Cell.” Frontline. PBS. October, 16.

http://www.pbs.org/wgbh/pages/frontline/shows/sleeper/etc/script.html

Russakoff, Dale and Dan Eggen. 2007. “Six Charged in Plot to Attack Fort Dix.”

Washington Post, May 9, 2007.

Ryan, Joe. “N.J. terror suspects to appear in court for bail hearing.” Hiiraan Online,

June 10, 2010. (http://www.hiiraan.com/comments2-news-2010-Jun-

n_j_terror_suspects_to_appear_in_court_for_bail_hearing.aspx)

Schmitt, Eric, and Charlie Savage. 2010. “In Terrorism Stings, Questions of

Entrapment.” The New York Times, November 29

http://www.nytimes.com/2010/11/30/us/politics/30fbi.html

(Accessed January 20, 2011).

St. Petersburg Times. 2010. “Q&A: The Plot.” March 10.

(http://www.sptimes.com/2006/08/10/Worldandnation/QA_The_plot.shtml)

52

Stern, Jessica. 2010. “Mind Over Martyr: How to De-Radicalize Islamist Extremists.”

Foreign Affairs. Council on Foreign Relations. January/February 2010.

Sulzberger, A.G. 2010. “Two More Men Charged in Plot to Bomb Subways.” New York

Times. February 25. (http://www.nytimes.com/2010/02/26/nyregion/26terror.html)

Temple-Raston, Dina. Terrorism Case Shows Range of Investigators’ Tools. National

Public Radio. October 3.

(http://www.npr.org/templates/story/story.php?storyId=113453193) (Accessed

January 25, 2011)

The Guardian. 2009. “Former U.S. University Student Convicted of Terror Charge.”

June 10. (http://www.guardian.co.uk/world/2009/jun/10/georgia-tech-student-

videotape-terrorism)

Thomas, Pierre and Jason Ryan. 2009. “FBI Stings are Chilling Evidence of

Homegrown Terror.” ABC News. September 25.

(http://abcnews.go.com/Politics/fbi-terror-stings-smadi-finton-allegedly-ties-

osama/story?id=8670328)

Thomas, Pierre and Jason Ryan. 2010. “’Lone Wolf’ Charged with Plotting Attack

During Christmas Rush.” ABC News. March 4.

(http://abcnews.go.com/TheLaw/story?id=2710776&page=1)

Times. 2007. “Profile: Khalid Sheikh Mohammed.” The Times (UK), March 15

http://www.timesonline.co.uk/tol/news/world/us_and_americas/article1517893.ec

e (Accessed January 20, 2011).

Trahan, Jason, Todd J. Gillman, and Scott Goldstein. “Dallas Bomb Plot Suspect Told

Landlord He was Moving Out.” Dallas Morning News. September 26.

(http://www.dallasnews.com/sharedcontent/dws/dn/latestnews/stories/092409dn

metbombarrest.1b177db8b.html)

United States Department of Justice. 2008. “Passing Secrets at Sea.” March 10.

(http://www.fbi.gov/page2/march08/secrets_031008.html)

White, Josh, and Keith B. Richburg. n.d. “Terror Informant for FBI Allegedly Targeted

Agents.” The Washington Post http://www.washingtonpost.com/wp-

dyn/content/article/2008/01/18/AR2008011803766.html (Accessed January 20,

2011).

¢ EXPANDED SEARCH AND SURVEILLANCE TOOLS

American Civil Liberties Union. “ACLU Releases Comprehensive Report On Patriot Act

Abuses.” March 11, 2009. (http://www.aclu.org/national-security/aclu-releases-

comprehensive-report-patriot-act-abuses)

Bell, Colleen. 2006. “Surveillance Strategies and Populations at Risk: Biopolitical

Governance in Canada’s National Security Policy.” Security Dialogue 37:

147-165.

Center for National Security Studies. 2007. “The Foreign Intelligence Surveillance Act

and Effectively Protecting the Liberty and Security of Americans.”

Committee Print. 2003. CMP-2003-ISH-0002. Compilation of Intelligence Laws and

Related Laws and Executive Orders of Interest to the National Intelligence

Community, As Amended Through Mar. 25,2003. June 2003. LexisNexis

Congressional Research Digital Collection.

Congressional Committee Print. 2005. CMP-2005-GAO-0019. USA PATRIOT Act:

Additional Guidance Could Improve Implementation of Regulations Related to

Customer Identification and Information Sharing Procedures. May 2005.

LexisNexis Congressional Research Digital Collection.

Congressional Hearing. 2001. HRG-2001-SJS-0037. Protecting Constitutional

Freedoms in the Face of Terrorism. October 3. LexisNexis Congressional

Hearings Digital Collection.

EXTENDED B IB L I OGRAPHY

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

Page 53: COUNTERTERRORISM SINCE 9/11

53

Congressional Hearing. 2001. HRG-2001-SJS-0052. Department of Justice Oversight:

Preserving Our Freedoms While Defending Against Terrorism. December 28.

LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2002. HRG-2002-SJS-0001. Tools Against Terror: How the

Administration Is Implementing New Laws in the Fight To Protect Our Homeland.

October 9. LexisNexis Congressional

Congressional Hearing. 2003. HRG-2003-HJH-0048. Anti-Terrorism Investigations and

the Fourth Amendment After Sept. 11, 2001. May 20. LexisNexis Congressional

Hearings Digital Collection.

Congressional Hearing. 2003. HRG-2003-SJS-0034. America After 9/11: Freedom

Preserved or Freedom Lost. November 18. LexisNexis Congressional Hearings

Digital Collection.

Congressional Hearing. 2003. HRG-2003-SJS-0058. Oversight Hearing: Law

Enforcement and Terrorism. July 23. LexisNexis Congressional Hearings Digital

Collection.

Congressional Hearing. 2004. HRG-2004-HFS-0085. Legislative Proposals To

Implement the Recommendations of the 9/11 Commission. September 22.

LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2004. HRG-2004-SJS-0046. Review of Counter-Terrorism

Legislation and Proposals, Including the USA PATRIOT Act and the SAFE Act.

September 22. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2004. HRG-2004-SJS-0050. FBI Oversight: Terrorism and

Other Topics. May 20. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2004. HRG-2004-SJS-0052. DOJ Oversight: Terrorism and

Other Topics. June 8. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2005. HRG-2005-HJH-0158. Implementation of the USA

PATRIOT Act: Section 201, 202, 223 of the Act That Address Criminal Wiretaps,

and Section 213 of the Act That Addresses Delayed Notice. May 3. LexisNexis

Congressional Hearings Digital Collection.

Congressional Hearing. 2005. HRG-2005-HJH-0161. USA PATRIOT Act: A Review for

the Purpose of Reauthorization. April 6. LexisNexis Congressional Hearings

Digital Collection.

Congressional Hearing. 2005. HRG-2005-HJH-0164. Reauthorization of the USA

PATRIOT Act. June 8. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2005. HRG-2005-HJH-0166. Implementation of the USA

PATRIOT Act: Prohibition of Material Support Under Sections 805 of the USA

PATRIOT Act and 6603 of the Intelligence Reform and Terrorism Prevention Act

of 2004. May 10. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2005. HRG-2005-HJH-0167. Implementation of the USA

PATRIOT Act: Effect of Sections 203(B) and (D) on Information Sharing. April 19.

LexisNexis Congressional Hearings.

Congressional Hearing. 2005. HRG-2005-HJH-0168. Implementation of the USA

PATRIOT Act: Section 212—Emergency Disclosure of Electronic

Communications To Protect Life and Limb. May 5. LexisNexis Congressional

Hearings Digital Collection.

Congressional Hearing. 2005. HRG-2005-HJH-0169. Implementation of the USA

PATRIOT Act: Section 218—Foreign Intelligence Information (“The Wall”). April

28. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2005. HRG-2005-HJH-0170. Implementation of the USA

PATRIOT Act: Sections of the Act That Address the Foreign Intelligence

Surveillance Act (FISA). April 26, 28. LexisNexis Congressional Hearings Digital

Collection.

Congressional Hearing. 2005. HRG-2005-HJH-0171. Implementation of the USA

PATRIOT Act: Crime, Terrorism and the Age of Technology. April 21. LexisNexis

Congressional Hearings Digital Collection.

Congressional Hearing. 2005. HRG-2005-HJH-0174. Reauthorization of the USA

PATRIOT Act (Continued). June 10. LexisNexis Congressional Hearings Digital

Collection.

Congressional Hearing. 2005. HRG-2005-ISS-0008. USA PATRIOT Act. May 24.

LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2005. HRG-2005-SJS-0023. Oversight of the USA PATRIOT

Act. May 10. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2006. HRG-2006-HSC-0022. Protection of Privacy in the DHS

Intelligence Enterprise, Part II and I. April 6. LexisNexis Congressional Hearings

Digital Collection.

Congressional Hearing. 2007. HRG-2007-HFS-0038. Suspicious Activity and Currency

Transaction Reports: Balancing Law Enforcement Utility and Regulatory

Requirements. May 10. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2007. HRG-2007-HJH-0019. Inspector General’s Independent

Report on the FBI’s Use of National Security Letters. March 20. LexisNexis

Congressional Hearings Digital Collection.

Congressional Hearing. 2007. HRG-2007-SJS-0009. Misuse of Patriot Act Powers: The

Inspector General’s Findings of Improper Use of the National Security Letters by

the FBI. March 21. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2007. HRG-2007-SJS-0034. Responding to the Inspector

General’s Findings of Improper Use of National Security Letters by the FBI. April

2007. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2007. HRG-2007-SJS-0067. Oversight of the Federal Bureau of

Investigation. March 27. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2008. HRG-2008-HJH-0009. National Security Letters Reform

Act of 2007. April 15. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2009. HRG-2009-HJH-0047. USA PATRIOT Act. September 22.

LexisNexis Congressional Hearings.

Congressional Hearing. 2009. HRG-2009-SJS-0025. Reauthorizing the USA PATRIOT

Act: Ensuring Liberty. September 23. LexisNexis Congressional Hearings Digital

Collection.

Congressional Research Service. 2001. CRS-2001-AML-0052. Terrorism: Section-by-

Section Analysis of the USA PATRIOT Act. December 10. LexisNexis

Congressional Research Digital Collection.

Congressional Research Service. 2002. CRS-2002-AML-0032. USA PATRIOT Act: A

Legal Analysis. April 15. LexisNexis Congressional Research Digital Collection.

Congressional Research Service. 2002. CRS-2002-AML-0037. USA PATRIOT Act: A

Sketch. April 18. LexisNexis Congressional Research Digital Collection.

Congressional Research Service. 2002. CRS-2002-AML-0089. Terrorism and

Extraterritorial Jurisdiction in Criminal Cases: Recent Developments in Brief.

September 6. LexisNexis Congressional Research Digital Collection.

Congressional Research Service. 2004. CRS-2004-AML-0195. Financial Institution

Customer Identification Programs Mandated by the USA. Aug 5. LexisNexis

Congressional Research Digital Collection.

Congressional Research Service. 2004. CRS-2004-RSI-0073. “Sensitive But

Unclassified” and Other Federal Security Controls on Scientific and Technical

Information: History and Current Controversy. Feb 20. LexisNexis Congressional

Research Digital Collection.

EXTENDED B IB L I OGRAPHY

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Page 54: COUNTERTERRORISM SINCE 9/11

Congressional Research Service. 2004. CRS-2004-RSI-1110. Internet Privacy: Law

Enforcement Monitoring of E-Mail and Web Usage. August 17. LexisNexis

Congressional Research Digital Collection.

Congressional Research Service. 2005. CRS-2005-AML-0056. Security and Freedom

Ensured Act (SAFE Act) (H.R. 1526) and Security and Freedom Enhancement

Act (SAFE Act) (S. 737): Section-By-Section Analysis. May 9. LexisNexis

Congressional Research Digital Collection.

Congressional Research Service. 2005. CRS-2005-AML-0057. SAFE Acts of 2005:

H.R. 1526 and S. 737 — A Sketch. May 9. Congressional Research Digital

Collection.

Congressional Research Service. 2006. CMP-2006-HJH-0006. Constitution in Crisis:

With 26 Laws Implicated by Administration Misconduct. June 2006. LexisNexis

Congressional Research Digital Collection.

Congressional Research Service. 2006. CRS-2006-AML-0019. USA PATRIOT

Improvement and Reauthorization Act of 2005. February 17. LexisNexis

Congressional Research Digital Collection.

Congressional Research Service. 2006. CRS-2006-AML-0035. Libraries and the USA

PATRIOT Act. Feb. 3. LexisNexis Congressional Research Digital Collection.

Congressional Research Service. 2006. CRS-2006-AML-0071. USA Patriot Act Sunset:

A Sketch. Feb 6. LexisNexis Congressional Research Digital Collection.

Congressional Research Service. 2006. CRS-2006-AML-0192. USA PATRIOT

Improvement and Reauthorization Act of 2005: A Sketch. March 28. LexisNexis

Congressional Research Digital Collection.

Congressional Research Service. 2006. CRS-2006-AML-0477. USA PATRIOT

Improvement and Reauthorization Act of 2005: A Legal Analysis. December 21.

LexisNexis Congressional Research Digital Collection.

Congressional Research Service. 2006. CRS-2006-FDT-0169. Statutory Procedures

Under Which Congress Is to Be Informed of U.S. Intelligence Activities,

Including Covert Operations. January 18. LexisNexis Congressional Research

Digital Collection.

Congressional Research Service. 2007. CRS-2007-FDT-0229. Sharing Law

Enforcement and Intelligence Information: The Congressional Role. February 13.

LexisNexis Congressional Research Digital Collection.

Congressional Research Service. 2010. CRS-2010-AML-0134. Government Collection

of Private Information: Background and Issues Related to the USA PATRIOT Act

Reauthorization. March 2. LexisNexis Congressional Research Digital Collection.

Congressional Research Service. 2010. CRS-2010-AML-0140. Amendments to the

Foreign Intelligence Surveillance Act (FISA) Set to Expire February 28, 2011.

March 2. LexisNexis Congressional Research Digital Collection.

Congressional Research Service. 2010. CRS-2010-AML-0484. National Security

Letters: Proposed Amendments in the 111th Congress. Dec 27. LexisNexis

Congressional Research Digital Collection.

Congressional Research Service. 2010. CRS-2010-FDT-0861. Intelligence Issues for

Congress. Oct. 14. LexisNexis Congressional Research Digital Collection.

Cristina Corbin. 2009. “Patriot Act Likely Helped Thwart NYC Terror Plot, Security

Experts Say.” http://www.foxnews.com/politics/2009/05/21/patriot-act-likely-

helped-thwart-nyc-terror-plot-security-experts-say/ (Accessed January 20, 2011).

Department of Justice. Office of Inspector General. “A Review of the Federal Bureau of

Investigation’s Use of National Security Letters.” March 2007.

(Http://www.usdoj.gov/oig/special/s0703a/final.pdf)

Department of the Treasure, Financial Crimes Enforcement Network, the SAR Activity

Review – By The Numbers, Issue 10. Retrieved May 2008.

(http://www.fincen.gov/news room/rp/files/sar by num 10.pdf)

54

Electronic Privacy Information Center. “Foreign Intelligence Surveillance Act Orders,

1979-2007.” Retrieved December 1, 2008.

(http://epic.org/privacy/wiretap/stats/fisa_stats.html#footnote12)

Fine, Glenn. 2007-A. “A Review of the Federal Bureau of Investigation’s Use of National

Security Letters.” Office of the Inspector General. Department of Justice. March

2007. Washington, D.C.

Fine, Glenn. 2007-B. “A Review of the Federal Bureau of Investigation’s Use of Section

215 Orders for Business Records.” Office of the Inspector General. Department

of Justice. March 2007. Washington, D.C.

Gellman, Barton. 2005. “The FBI’s Secret Scrutiny.” The Washington Post.

November 6, 2005.

Hearings Digital Collection. Congressional Hearing. 2002. HRG-2002-SJS-0003.

Oversight of the Department of Justice. July 25. LexisNexis Congressional

Hearings Digital Collection.

Howell, Beryl A. 2003. “Seven Weeks: The Making of the USA Patriot Act.” George

Washington Law Review 72:1145.

“IG’s report on misuse of PATRIOT ACT.” (http://web.lexis-

nexis.com/congcomp/attachment/a.pdf?_m=4ef075b3a87081fb3c4e5c8780aae7

3a&wchp=dGLbVtb-

zSkSA&_md5=99546f04aafd3478e102e00e88e50942&ie=a.pdf)

Jackson, Brian. 2009. The Challenge of Domestic Intelligence in a Free Society: a

Multidisciplinary look at the Creation of a U.S. Domestic Counter-Terrorism

intelligence agency. Santa Monica CA: Rand Corp.

Johnson, Carrie. 2009. “Director of FBI Urges Renewal of Patriot Act.” Washington

Post. March, 26.

Johnson, Carrie. n.d. “FBI Chief Urges Renewal of Patriot Act Measures That Will

Expire in December.” The Washington Post http://www.washingtonpost.com/wp-

dyn/content/article/2009/03/25/AR2009032501862.html (Accessed January 20,

2011).

Kaplan, John. 1961. “Search and Seizure: A No-Man’s Land in the Criminal Law.”

California Law Review 49:474-503.

Keller, Susan Jo. 2007. Judge Rules Provisions in Patriot Act to Be Illegal. The New

York Times. September 27.

Martin, Kate. 2002. “Intelligence, Terrorism, and Civil Liberties.” Human Rights. Winter.

Martin, Kate. 2004. “Domestic Intelligence and Civil Liberties.” SAIS Review. Winter.

McNeill, Jena B. 2009. “Patriot Act: A Chance to Commit to National Security.” Heritage

Foundation. October 9. http://www.heritage.org/research/reports/2009/10/patriot-

act-a-chance-to-commit-to-national-security

“Must we Trade Rights for Security?”

http://heinonline.org/HOL/PDF?handle=hein.journals/cdozo27&collection=journal

s&id=2171&print=72&sectioncount=1&ext=.pdf

Neier, Aryeh. 2003. Taking liberties: four decades in the struggle for rights. 1st ed. New

York: Public Affairs.

Nieto, Marcus. “Public Video Surveillance: Is It An Effective Crime Prevention Tool?”

California Research Bureau. June 1997. (http://www.library.ca.gov/crb/97/05/)

Strom, Ron. “Patriot Act II: Pro-security, or Anti-freedom?” December 5, 2004. World

Net Daily. (http://www.wnd.com/news/article.asp?ARTICLE_ID=41722)

Setty, Sudha. 2009. “National Security Without Secret Laws.” American Constitution

Society for Law and Policy.

http://www.acslaw.org/files/Setty%20Issue%20Brief.pdf

EXTENDED B IB L I OGRAPHY

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

Page 55: COUNTERTERRORISM SINCE 9/11

55

Transactional Records Access Clearinghouse. “National Profile and Enforcement:

Trends Over Time.” 2006. (http://trac.syr.edu/tracfbi/newfindings/current/)

US. Department Of Justice. 2004. “Report From The Field: The USA Patriot Act At

Work.” Washington, D.C.

Yeh, B. and C. Doyle. 2006. “USA PATRIOT Improvement and Reauthorization Act of

2005: A Legal Analysis” Congressional Research Service. RL33332.

(http://www.fas.org/sgp/crs/intel/RL33332.pdf)

Zogby, James. “Hearing on ‘Reauthorization of the PATRIOT Act’.” June 10, 2005.

The Arab American Institute. (http://www.aaiusa.org/dr-zogby/4151)

¢ DATA MINING

Bamford and PBS: Nova. 2009. “The Spy Factory.” Public Broadcasting Service.

February 3, 2009. (http://www.pbs.org/wgbh/nova/military/spy-factory.html)

Bamford, James. 2008. The Shadow Factory: The Ultra-Secret NSA from 9/11 to the

Eavesdropping on America. Doubleday.

Bankston, Kevin. “Court Rejects Government’s Executive Power Claims and Rules

That Warrantless Wiretapping Violated Law.” March 31, 2010. Electronic Frontier

Foundation. (http://www.eff.org/deeplinks/2010/03/court-rules-warrantless-

wiretapping-illegal)

Bergman, Lowell, Eric Lichtblau, Scott Shane, and Don van Natta Jr. 2006. “Spy

Agency Data After Sept. 11 Led F.B.I. to Dead Ends.” The New York Times.

January, 17. http://www.nytimes.com/2006/01/17/politics/17spy.html

Chiarella, Major Louis A. and Newton, Major Michael A. 1997. “So Judge, How Do I Get

That FISA Warrant?” The Policy and Procedure for Conducting Electronic

Surveillance. The Army Lawyer. October 1997.

Committee Print. 2007. CMP-2007-SER-0032. FISA Modernization and Carrier Liability.

January 23. LexisNexis Congressional Research Digital Collection.

Congressional Hearing. 2004. HRG-2004-HJH-0066. Privacy and Civil Liberties in

the Hands of the Government Post-Sept. 11, 2001: Recommendations of the

9/11 Commission and the U.S. Department of Defense Technology and Privacy

Advisory Committee. August 20. LexisNexis Congressional Hearings

Digital Collection.

Congressional Hearing. 2006. HRG-2006-HGR-0088. National Security Whistleblowers

in the Post-Sept. 11th Era: Lost in a Labyrinth and Facing Subtle Retaliation.

February 14. LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2006. HRG-2006-HJH-0024. Legislative Proposals To Update

the Foreign Intelligence Surveillance Act (FISA). September 6. LexisNexis

Congressional Hearings Digital Collection.

Congressional Hearing. 2006. HRG-2006-HJH-0051. Electronic Surveillance

Modernization Act. September 12. LexisNexis Congressional Hearings

Digital Collection.

Congressional Hearing. 2006. HRG-2006-HJH-0062. “Constitution in Crisis: Domestic

Surveillance and Executive Power”. January 20. LexisNexis Congressional

Hearings Digital Collection.

Congressional Hearing. 2006. HRG-2006-ISS-0002. Nomination of General Michael V.

Hayden, USAF To Be Director of the Central Intelligence Agency. May 18.

LexisNexis Congressional Hearings Digital Collection.

Congressional Hearing. 2006. HRG-2006-SJS-0017. Wartime Executive Power and the

National Security Agency’s Surveillance Authority. February 6. LexisNexis

Congressional Hearings Digital Collection.

Congressional Hearing. 2007. HRG-2007-HJH-0042. Constitutional Limitations

on Domestic Surveillance. June 7. LexisNexis Congressional Hearings

Digital Collection.

Congressional Hearing. 2007. HRG-2007-ISS-0003. Modernization of the Foreign

Intelligence Surveillance Act. May 1. LexisNexis Congressional Hearings

Digital Collection.

Congressional Hearing. 2009. HRG-2009-ASH-0103. [Cyberspace as a Warfighting

Domain: Policy, Management and Technical Challenges to Mission Assurance].

May 5. LexisNexis CongressionalHearings Digital Collection.

Congressional Hearing. 2009. HRG-2009-SJS-0064. [Cybersecurity: Preventing

Terrorist Attacks and Protecting Privacy in Cyberspace]. November 17.

LexisNexis Congressional Hearings Digital Collection.

Congressional Research Service. 2006. CRS-2006-FDT-0180. Presidential Authority

to Conduct Warrantless Electronic Surveillance to Gather Foreign Intelligence

Information. January 5. LexisNexis Congressional Research Digital Collection.

Federal Bureau of Investigation, Office of Inspector General. “Follow-up Audit

of the Terrorist Screening Center.” September 2007.

(http://www.justice.gov/oig/reports/FBI/a0741/intro.htm)

Fine, Glenn, Gordon Heddell, Patricia Lewis, George Ellard, and Roslyn Mazer. 2009.

“Unclassified Report on the President’s Surveillance Program.”

(http://www.dni.gov/reports/report_071309.pdf)

Gellman, Barton. 2005. The FBI’s Secret Scrutiny: In Hunt for Terrorist, Bureau Records

of Ordinary Americans. The Washington Post. November 6.

(http://www.washingtonpost.com/wp-

dyn/content/article/2005/11/05/AR2005110501366.html) (Accessed January 25,

2011.)

Gorman, Siobhan. “NSA’s Domestic Spying Grows As Agency Sweeps Up Data.”

March 10, 2008. Wall Street Journal.

(http://online.wsj.com/article/SB120511973377523845.html?mod=hps_us_whats

_news)

Jonas, Jeff and Jim Harper. 2006. “Effective Counter-Terrorism and the Limited Role

of Predictive Data.” December 11, 2006. The Cato Institute. Policy analysis

584:1–11. (http://www.cato.org/pub_display.php?pub_id=6784)

Keefe, Patrick Radden. 2006. Chatter: Uncovering the Echelon Surveillance Network

and the Secret World of Global Eavesdropping. Random House Trade

Paperbacks.

Liptak, Adam. 2007. “Spying Program May be Tested by Terror Case.” The New York

Times. August, 26. http://www.nytimes.com/2007/08/26/us/26wiretap.html

Markle Foundation Task Force. “Meeting the Threat of Terrorism. Authorized Use:

An Authorized Use Standard for Infomaiton Sharing Strengthens National

Security and Respects Civil Liberties.”

Markle Foundation Task Force. 2002. “Protecting America’s Freedom in The Information

Age: A Report of the Markle Foundation Task Force.

National Research Council (U.S.). 2008. Protecting Individual Privacy in the Struggle

Against Terrorists: A Framework for Program Assessment. Washington D.C.:

National Academies Press.

Office of the Director of National Intelligence. 2009b. “Data Mining Report.”

(http://www.dni.gov/electronic_reading_room/ODNI_Data_Mining_Report_09.pdf)

Powers, Thomas. 2005. “Black Arts.” The New York Review of Books 52.

(http://www.nybooks.com/articles/17974)

Public Broadcasting Service. “Ask the Expert: Jim Bamford.” Nova Episode: Spy

Factory, February 9, 2009. (http://www.pbs.org/wgbh/nova/spyfactory/ask.html)

EXTENDED B IB L I OGRAPHY

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Page 56: COUNTERTERRORISM SINCE 9/11

Risen, James, and Charlie Savage. “Court Ruling on Wiretap Is a Challenge for

Obama.” The New York Times, April 1 2010

(http://www.nytimes.com/2010/04/02/us/politics/02nsa.html?ref=us)

Savage, Charlie and James Risen. “Federal Judge Finds N.S.A. Wiretaps Were Illegal.”

March 31, 2010. New York Times.

(http://www.nytimes.com/2010/04/01/us/01nsa.html) (Accessed January 20,

2011.)

Schneier, Bruce. “U.S. enables Chinese hacking of Google.” January 23, 2010.

CNN.com.

(http://www.cnn.com/2010/OPINION/01/23/schneier.google.hacking/index.html)

(Accessed January 20, 2011.)

Shachtman, Noah. “’Don’t Be Evil,’ Meet ‘Spy on Everyone’: How the NSA Deal Could

Kill Google.” Wired.com, February 4, 2010.

(http://www.wired.com/dangerroom/2010/02/from-dont-be-evil-to-spy-on-

everyone/) (Accessed January 20, 2011.)

The Constitution Project. 2010. “Principles for Government Data Mining: Perserving

Civil Liberties in the Information Age.” Washington, D.C.

¢ ETHNIC AND RELIGIOUS PROFIL ING

ACLU. 2008. “Secure Flight Re-Engineering Welcomed but Watchlist Problems Remain

Unaddressed.” October 22, 2008. American Civil Liberties Union.

(http://www.aclu.org/technology-and-liberty/secure-flight-re-engineering-

welcomed-watchlist-problems-remain-unaddressed) (Accessed January 20,

2011.)

“Airport Security.” New York Times. January 6, 2010. Times Topics.

(http://topics.nytimes.com/top/reference/timestopics/subjects/a/airport_security/in

dex.html) (Accessed January 20, 2011.)

Chakrabarti, Samidh and Aaron Strauss. 2002. “Carnival Booth” Law and Ethics On The

Electronic Frontier. Massachusetts Institute of Technology Computer Science

and Artificial Intelligence Laboratory Student Papers Spring 2002. Chapter 3.1.

May 16, 2002. (http://groups.csail.mit.edu/mac/classes/6.805/student-

papers/spring02-papers/caps.htm#_Toc9406731) (Accessed January 20, 2011.)

Congressional Hearing. 2003. HRG-2003-SJS-0001. Visa Issuance and Homeland

Security. LexisNexis Congressional Hearings Digital Collection.

Congressional Research Service. 2003. CRS-2003-DSP-0112. Foreign Students in the

United States: Policies and Legislation. January 24. LexisNexis Congressional

Research Digital Collection.

Department of Homeland Security. “Secretary Napolitano Announces New Measures to

Strengthen Aviation Security.” April 2, 2010.

(http://www.dhs.gov/ynews/releases/pr_1270217971441.shtm) (Accessed

January 20, 2011.)

Department Of Justice. 2003. “DOJ Racial_Profiling_Fact_Sheet.pdf.” June 17, 2003.

(http://www.justice.gov/opa/pr/2003/June/racial_profiling_fact_sheet.pdf)

(Accessed January 20, 2011.)

Epps, Garrett. “Vengeance is Brandon Mayfield’s.” October 3, 2007. Salon.com.

(http://dir.salon.com/story/news/feature/2007/10/03/brandon_mayfield/index.html)

(Accessed January 20, 2011.)

Globalsecurity.org. “National Security Entry Exit Registration System (NSEERS).

(http://www.globalsecurity.org/security/ops/nseers.htm) (Accessed January 20,

2011.)

Goldberg, Jeffrey. 2008. The Things He Carried. The Atlantic. November 2008.

(http://theatlantic.com/magazine/archive/2008/11/the-things-he-carried/7057/)

(Accessed January 25, 2011)

56

Government Accountability Office. 2003. “GAO-03-459: Justice Department’s Project

to Interview Aliens after September 11, 2001.” Washington, D.C.

Government Accountability Office. 2003. “GAO-03-459. Homeland Security:

Justice Department’s Project to Interview Aliens after September 11, 2001.”

Washington, D.C.

Government Accountability Office. 2007. “GAO-07-378T. Border Security: US-VISIT

Program Faces Strategic, Operational, and Technological Challenges at Land

Ports of Entry.” Washington, D.C.

Government Accountability Office. 2007. “GAO-07-632T. Homeland Security: US-Visit

Program Faces Operational, Technological, and Management Challenges.”

Washington, D.C.

Government Accountability Office. 2008. “GAO-08-361. Homeland Security: Strategic

Solution for US-VISIT Program Needs to be Better Defined, Justified, and

Coordinated.” Washington, D.C.

Government Accountability Office. 2010. “GAO-10-535R: Aviation Security: Efforts to

Validate TSA’ Passenger Screening Behavior Detection Program Underway, but

Opportunities Exist to Strengthen Validation and Address Operational

Challenges.” Washington D.C.

Government Accountability Office. 2010. “GAO-10-763. Aviation Security: Efforts to

Validate TSA’s Passenger Screening behavior Detection Program Underway, but

Opportunities Exist to Strengthen Validation and Address Operational

Challenges.” Washington, D.C.

Hampson, Rick. “USATODAY.com - Anti-snitch Campaign Riles Police, Prosecutors.”

March 29, 2006. (http://www.usatoday.com/news/nation/2006-03-28-stop-

snitching_x.htm) (Accessed January 20, 2011.)

Hsu, Spencer and Carrie Johnson. “TSA Accidentally Reveals Airport Security Secrets.”

December 9, 2009. Washington Post. (http://www.washingtonpost.com/wp-

dyn/content/article/2009/12/08/AR2009120803206_2.html?wpisrc=newsletter&wp

isrc=newsletter&wpisrc=newsletter&sid=ST2009120900011) (Accessed January

20, 2011.)

Malik, Hasnain. “Senators Slam US Screening System for Pakistanis.” AllVoices.com.

(http://www.allvoices.com/contributed-news/5069353-senators-slam-us-

screening-system-for-pakistanis) (Accessed January 20, 2011.)

McIntire, Mike. “Ensnared by Error on Growing U.S. Watch List.” April 6, 2010. New

York Times. (http://www.nytimes.com/2010/04/07/us/07watch.html) (Accessed

January 20, 2011.)

Metcalf, Eddy. 2010 “DHS To Review Screening Of Passengers By Observation

Techniques.” Aviation Online Magazine. May 25.

(http://avstop.com/news_may_2010/dhs_to_review_screening_of_passengers_b

y_observation_techniques.htm) (Accessed January 20, 2011.)

Press, W. H. 2009. “From the Cover: Strong Profiling is not Mathematically Optimal for

Discovering Rare Malfeasors.” Proceedings of the National Academy of

Sciences 106:1716-1719.

Rosenblatt, Dana. “Behavioral screening — the future of airport security?”

December 17, 2008. CNN.com.

(http://www.cnn.com/2008/TECH/12/02/airport.security/index.html) (Accessed

January 20, 2011.)

Sandomir, David. 2009. “Preventing Terrorism in the Long Term: The Disutility of Racial

Profiling in Preventing Crime and the Counterproductive Nature of Ethnic and

Religious Profiling in Counterterrorism Policing.” Master Thesis. Naval

Postgraduate School. Monterey, CA. http://handle.dtic.mil/100.2/ADA514381

Schneier, Bruce. “Profiling.” July 22, 2005. Schneier on Security Blog.

(http://www.schneier.com/blog/archives/2005/07/profiling.html) (Accessed

January 20, 2011.)

EXTENDED B IB L I OGRAPHY

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

Page 57: COUNTERTERRORISM SINCE 9/11

57

Schneier, Bruce. “Racial Profiling No Better than Random Screening.” February 4,

2009. Schneier on Security Blog.

(http://www.schneier.com/blog/archives/2009/02/racial_profilin.html) (Accessed

January 20, 2011.)

Shora, Kareem and Shoba Sivaprasa Wadhia. “The Consequences of America’s Efforts

to Secure its Borders.” American-Arab Anti-Discrimination Committee. Pg. 29.

(http://www.adc.org/PDF/nseerspaper.pdf) (Accessed January 20, 2011.)

Tajfel, Henri. “Social Psychology of Intergroup Relations.” Annual Review Psychology.

1982. 33:1-39.

Thaindian News. 2010. “Resolution Against US Airport Screening Passed in Pakistan.”

January 13, 2010. The Indian News.

(http://www.thaindian.com/newsportal/south-asia/resolution-against-us-airport-

screening-passed-in-pakistan_100303005.html) (Accessed January 20, 2011.)

U.S. Immigration and Customs Enforcement. “Programs: Special Registration.”

(http://www.ice.gov/nseers/) (Accessed January 20, 2011.)

“Will Profiling Make a Difference?” January 4, 2010. Room for Debate Blog, New York

Times. (http://roomfordebate.blogs.nytimes.com/2010/01/04/will-profiling-make-

a-difference/) (Accessed January 20, 2011.)

“Would-Be Bomber Used Powerful Explosive.” December 27, 2009. CBS News.

(http://www.cbsnews.com/stories/2009/12/27/national/main6028366.shtml)

(Accessed January 20, 2011.)

Zeleny, Jeff. 2010. “Security Checks on Flights to U.S. to Be Revamped.”

The New York Times, April 1

(http://www.nytimes.com/2010/04/02/us/02terror.html?pagewanted=1&ref=us)

(Accessed January 20, 2011.)

Zogby, John. 2005. “Statement before the U.S. House of Representatives Committee

on the Judiciary.” Hearing on “Reauthorization of the PATRIOT Act.”

June 10, 2005.

¢ ENHANCED INTERROGATION

Alexander, Matthew. 2008. How to Break a Terrorist: The U.S. Interrogators Who Used

Brains, Not Brutality, To Take Down the Deadliest Man in Iraq. 1st ed. New York:

Free Press.

Bennett, R. 2007. “Endorsement by the Seminar Military Interrogators.” Peace and

Conflict: Journal of Peace Psychology 13:391–392.

Brehm, S. S, and J. W Brehm. 1981. Psychological reactance: A Theory of Freedom

and Control. New York: Academic Press.

Canfield, J. 2004. “The Torture Memos: The Conflict between a Shift in US Policy

towards a Condemnation of Human Rights and International Prohibitions against

the Use of Torture.” Hofstra Law Review 33:1049.

Central Intelligence Agency. 1963. KUBARK: Counter-Intelligence Interrogation-

July 1963.

(http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB122/CIA%20Kubark%201-

60.pdf) (Accessed January 20, 2011.)

Central Intelligence Agency. 2005. “Detainee Reporting Pivotal for the War Against

Al-Qa’ida”. June 3.

Cooley, S. C. 2008. “Entertainment Media and ‘Backstage’ Event Framing: How 24

Defines Torture.” (http://etd.lsu.edu/docs/available/etd-04012008-

134143/unrestricted/EntertainmentMediaThesis.pdf) (Accessed January 20,

2011.)

Costanzo, Mark. “Psychologists and the Use of Torture in Interrogations.”Analyses of

Social Issues and Public Policy. 2007.

(http://www3.interscience.wiley.com/journal/118537150/abstract?CRETRY=1&SR

ETRY=0) (Accessed January 20, 2011.)

Danzig, David. “Obama Says No to Torture; Interrogators Say Yes to Obama.”

February 27, 2009. The Huffington Post. (http://www.huffingtonpost.com/david-

danzig/obama-says-no-to-torture_b_160207.html) (Accessed January 20, 2011.)

Danzig, David. “What We Still Don’t Know About Torture.” February 11, 2009. The

Huffington Post. (http://www.huffingtonpost.com/david-danzig/what-we-still-dont-

know-a_b_166130.html) (Accessed January 20, 2011.)

Deci, E.L. and R.M. Ryan. 2004. Handbook of Self-Determination Research. Rochester:

University of Rochester Press.

Department of Defense. 2005. “Guantanamo Provides Valuable Intelligence

Information.” June 12. Office of the Assistant Secretary of Defense (Public

Affairs). (http://www.fas.org/irp/news/2005/06/dod061205.html) (Accessed

January 20, 2011.)

Dershowitz, Alan. 2002. Why Terrorism Works: Understanding the Threat, Responding

to the Challenge. New Haven: Yale University Press.

Eggen, Dan, and Walter Pincus. n.d. “FBI, CIA Debate Significance of Terror Suspect.”

The Washington Post http://www.washingtonpost.com/wp-

dyn/content/article/2007/12/17/AR2007121702151.html (Accessed January 20,

2011).

Fein, Robert, Paul Lehner, and Bryan Vossekuil. 2006. Educing Information: Science

and Art - Foundations for the Future. National Defense Inteligence College

Press.

Finn, Peter, and Joby Warrick. n.d. “Detainee’s Harsh Treatment Foiled No Plots.” The

Washington Post http://www.washingtonpost.com/wp-

dyn/content/article/2009/03/28/AR2009032802066.html (Accessed January 20,

2011).

Fox News Channel. 2009. “CIA Probe Fires Up Debate Over Whether Harsh

Interrogations Were Effective.” August 25, 2009.

(http://www.foxnews.com/politics/2009/08/25/cia-probe-fires-debate-harsh-

interrogations-effective/) (Accessed January 20, 2011.)

Goldsmith, Jack. 2009. “The Cheney Fallacy.” The New Republic. May 18.

(http://www.tnr.com/article/politics/the-cheney-fallacy?id=1e733cac-c273-48e5-

9140-80443ed1f5e2&p=1) (Accessed January 25, 2011.)

Helgerson, John. Special Review of Counter-Terrorism Detention and Interrogation

Activities (September 2001 — October 2003). Inspector General’s Report.

Central Intelligence Agency. May 7, 2004.

(http://luxmedia.com.edgesuite.net/aclu/IG_Report.pdf) (Accessed January 20,

2011.)

Hobfoll, S. E. 1991. “Traumatic Stress: A theory Based on Rapid Loss of Resources.”

Anxiety, Stress & Coping 4:187–197.

Holder, Eric. 2009. “Letter to John D. Rockefeller Narrating DOJ Advice to CIA

Regarding Legality of Enhanced Interrogation Techniques.”

(http://intelligence.senate.gov/pdfs/olcopinion.pdf) (Accessed January 20, 2011.)

Human Rights First. 2009. “Statement From 16 Retired Admirals And Generals,

Who Have Been Working Through Human Rights First, On Meeting Today With

President Obama To Discuss Executive Orders Banning Torture And Closing

Guantanamo.”

(http://www.humanrightsfirst.org/media/usls/2009/alert/388/index.htm)

(Accessed January 20, 2011.)

Isikoff, Michael. 2009. “We Could Have Done This the Right Way.” Newsweek.

April 25, 2009.

EXTENDED B IB L I OGRAPHY

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Page 58: COUNTERTERRORISM SINCE 9/11

Isikoff, Michael. 2009. “Ali Soufan Breaks His Silence - Newsweek.” Newsweek,

April 25 (http://www.newsweek.com/2009/04/24/we-could-have-done-this-the-

right-way.html) (Accessed July 3, 2010).

Jacobs, Andrew. 2010. “China Bans Court Evidence Gained Through Torture.”

The New York Times. May 31, 2010.

Jacobs, Andrew. 2010. “China Bans Court Evidence Gained Through Torture.”

The New York Times, May 31

(http://www.nytimes.com/2010/06/01/world/asia/01china.html) (Accessed January

20, 2011.

Josceleyn, Thomas. “the ‘Most Prolific’ Detainee.” The Weekly Standard. September 7.

http://www.weeklystandard.com/Content/Public/Articles/000/000/016/883kzm

tj.asp

Lassiter, G. 2004. Interrogations, Confessions, and Entrapment. New York:

Kluwer Academic/Plenum Publishers.

Lasson, K. 2007. “Torture, Truth Serum, and Ticking Bombs: Toward a Pragmatic

Perspective on Coercive Interrogation.” Loyola University – Chicago Law

Journal. 39:329.

Levit, Kenneth J. 2005. “The CIA and the Torture Controversy.” Journal of National

Security Law and Policy. Vol. 1:341.

Mason O.J., Brady F. 2009. “The Psychotomimetic Effects of Short-term Sensory

Deprivation’. Journal of Nervous and Mental Disorders. Vol. (10):783-5.

Mayer, Jane. 2010. “Counterfactual: A Curious History of the CIA’s secret Interrogation

Program.” The New Yorker. March 29, 2010

McCoy, Alfred. 2006. A Question of Torture: CIA Interrogation, from The Cold War to

The War on Terror. New York: Henry Holt and Co., Metropolitan Books.

Meek, James G. 2009. “U.S. Officials Slam Dick Cheney’s Claim that Waterboarding

9/11 Mastermind 183 Times was a ‘Success’.” New York Daily News. April 22.

NEFA Foundation. “CIA Congressional Briefs EIT.”

(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/CIA_Congressional

BriefsEIT.pdf) (Accessed January 20, 2011.)

NEFA Foundation. “CIA Detainee Info Key for GWOT.”

(http://www.nefafoundation.org/miscellaneous/CIA_DetaineeReportingKeyAQ.pdf

) (Accessed January 20, 2011.)

Noah, Timothy. “Cheney Refuted.” August 25, 2009. Slate Magazine.

(http://www.slate.com/id/2226276?obref=obinsite) (Accessed January 20, 2011.)

Noah, Timothy. 2009. “Water-Bored: Al-Qaida’s Plot to Bomb the Library Tower was not

Worth Torturing Anyone Over.: Slate. April 21.

Pilcher, J. J., and A. I. Huffcutt. 1996. “Effects of Sleep Deprivation on Performance:

a Meta-Analysis.” Sleep 19:318.

Rejali, Darius. 2009. Torture and Democracy. Princeton University Press. Princeton, NJ.

Rose, David. 2008 “Tortured Reasoning.” Vanity Fair. December 16th

(http://www.vanityfair.com/magazine/2008/12/torture200812?currentPage=4)

(Accessed January 20, 2011.)

Rumney, Philip N.S. 2005-2006. “Is Coercive Interrogation of Terrorist Suspects

Effective?: A Response to Bargaric and Clarke.” University of San Francisco Law

Review. Vol. 40.

Scheppele, Kim L. 2005. “Hypothetical Torture in the ‘War on Terrorism.’” Journal of

National Security Law and Policy. Vol. 1:285.

Scott, George. 2003. The History of Torture Throughout the Ages. [Whitefish MT]:

Kessinger Pub

58

Seligman, Martin E. P., 1972 “Learned Helplessness.” Annual Review of Medicine. Vol.

23:407-12

Shane, Scott. 2008. “Inside a 9/11 Mastermind’s Interrogation.” The New York Times,

June 22, 2008. (http://www.nytimes.com/2008/06/22/world/americas/22iht-

22ksm.13873332.html) (Accessed January 20, 2011.)

Shane, Scott. 2008. “The Unstudied Art of Interrogation.” The New York Times, March 9.

(http://www.nytimes.com/2008/03/09/weekinreview/09shane.html) (Accessed

January 20, 2011.)

Shane, Scott. 2009. “Waterboarding Used 266 Times on 2 Suspects.” The New York

Times, April 20, 2009. (http://www.nytimes.com/2009/04/20/world/20detain.html)

(Accessed January 20, 2011.)

Shane, Scott. and Mark Mazzetti. 2009. “In Adopting Harsh Tactics, No Look at Past

Use.” The New York Times, April 22

(http://www.nytimes.com/2009/04/22/us/politics/22detain.html?_r=1&pagewanted=

print) (Accessed January 20, 2011.)

Sherman, L. W. 1993. “Defiance, Deterrence, and Irrelevance: A Theory of the Criminal

Sanction.” Journal of Research in Crime and Delinquency 30:445–473.

Smith, R. Jeffrey. “Hill Panel Reviewing CIA Tactics.” The Washington Post

(http://www.washingtonpost.com/wp-

dyn/content/article/2009/05/09/AR2009050902489.html) (Accessed January 20,

2011.)

Solomon, S., J. Greenberg, and T. Pyszczynski. 2004. “The Cultural Animal: Twenty

years of terror Management Theory and Research.” Handbook of Experimental

Existential Psychology 13–34.

Soufan, Ali. 2009. “My Tortured Decision.” The New York Times. April 23, 2009.

(http://www.nytimes.com/2009/04/23/opinion/23soufan.html) (Accessed January

20, 2011.)

Stein, Jeff. 2010. “CIA Man Retracts Claim on Waterboarding.” Foreign Policy.

January 26, 2010.

Suedfield, Peter. 2007. “Torture, Interrogation, Security, and Psychology: Absolutist

versus Complex Thinking.” Analyses of Social Issues and Public Policy. Vol7:1.

Pp1-9.

Sunday Times. 2009. “September 11 Mastermind Khalid Sheikh Mohammed

‘Waterboarded’ 183 Times.” The Times (UK). April 20, 2009.

(http://www.timesonline.co.uk/tol/news/world/us_and_americas/article6130165.ece

) (Accessed January 20, 2011.)

Thiessen, Marc A. 2009. “The CIA’s Questioning Worked.” Washington Post. April 21.

Thiessen, Marc. 2009. “New Documents Show the CIA, Not the FBI, Got Zubaydah to

‘Cough Up’ Jose Padilla.” The National Review Online. October 31.

http://www.nationalreview.com/corner/189459/new-documents-show-cia-not-fbi-

got-zubadayh-cough-jose-padilla/marc-thiessen

United States Senate Select Committee on Intelligence. 2006. “Report on Postwar

Findings about Iraq’s WMD Programs and Links to Terrorism and How they

Compare with Prewar Assessments.” September 8, 2006.

(http://www.fas.org/irp/congress/2006_rpt/srpt109-331.pdf) (Accessed January 20,

2011.)

Warrick, Joby, and Peter Finn. n.d. “Interviews Offer Look at Roles of CIA Contractors

During Interrogations.” The Washington Post http://www.washingtonpost.com/wp-

dyn/content/article/2009/07/18/AR2009071802065.html (Accessed January 20,

2011).

EXTENDED B IB L I OGRAPHY

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

Page 59: COUNTERTERRORISM SINCE 9/11

59

¢ DETENTION AND PROSECUTION

OF TERROR SUSPECTS

Bartosiewicz, Petra. “Terrorism Trial in New York Carries Few Risks for Government.”

November 29, 2009. Los Angeles Times.

(http://www.latimes.com/news/opinion/commentary/la-oe-petra29-

2009nov29,0,477313.story) (Accessed January 20, 2011.)

Burch Elias, Stella. “Rethinking ‘Preventative Detention’ From A Comparative

Perspective: Three Frameworks For Detaining Terror Suspects.” Columbia

Human Rights Law Review. 2009.

(http://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1087&context=st

udent_papers) (Accessed January 20, 2011.)

Campbell, Benton J. 2009. Memorandum of Law in Support of the Government’s Motion

for a Permanent Order of Detention: United States of America v. Najibullah Zazi.

September 24.

Campbell, Benton. 2009. Criminal Complaint: United States of America v. Najibullah

Zazi. United States District Court for the District of Colorado. September 24.

Cohen, Andrew. “Khalid Sheik Mohammed and You.” November, 16, 2009.

(http://www.theatlantic.com/doc/200911u/prosecuting-sheik-mohammed)

(Accessed January 20, 2011.)

Congressional Hearing. 2008. HRG-2008-HJH-0085. From the Department of Justice to

Guantanamo Bay: Administration Lawyers and Administration Interrogation Rules

(Part V). July 17. LexisNexis Congressional Hearings Digital Collection.

Damphousse, Kelly and Brent L. Smith. 2002. “The American Terrorism Study: Patterns

of Behavior, Investigation and Prosecution of American Terrorists.” March 27,

2002. (http://www.ncjrs.gov/pdffiles1/nij/grants/193420.pdf)

Economist Magazine Blog: Democracy in America. “A Trying Debate.” November 18,

2009. Economist.com

(http://www.economist.com/blogs/democracyinamerica/2009/11/a_trying_debate)

(Accessed January 20, 2011.)

Eig, Larry, M. 1989. “Classified Procedures Act (CIPA): An Overview.” March 2, 1989.

(http://fas.org/sgp/crs/secrecy/89-172.pdf)

Elliott, Justin. “Are Military Tribunals Really Tougher On Terrorists Than Criminal

Courts?” February 3, 2010. Talking Points Memo Muckraker.

(http://tpmmuckraker.talkingpointsmemo.com/2010/02/are_military_tribunals_reall

y_tougher_than_criminal_courts.php) (Accessed January 20, 2011.)

Glaberson, William. 2008. “5 Charged in 9/11 Attacks Seek to Plead Guilty.”

The New York Times, December 9

http://www.nytimes.com/2008/12/09/us/09gitmo.html?_r=1 (Accessed July 3,

2010).

Greenberg, Karen, Jeff Grossman, Francesca Laguardia, Michael Price, and Jason

Porta. 2010. “Terror Trial Report Card 2001-2009.” The NYU School of Law

Center on Law and Security.

(http://www.lawandsecurity.org/publications/TTRCFinalJan14.pdf) (Accessed

January 20, 2011.)

Gude, Ken. “Criminal Courts Are Tougher on Terrorists than Military Detention.” January

20, 2010. Center for American Progress.

(http://www.americanprogress.org/issues/2010/01/criminal_courts_terrorists.html)

(Accessed January 20, 2011.)

Hakimi, Monica. 2007. “International Standards for Detaining Terrorism Suspects:

Moving beyond the Armed Conflict-Criminal Divide.” Case Western Reserve

Journal of International Law 40:593.

Helgerson, John. 2004. Special Review of Counter-Terrorism Detention and

Interrogation Activities (September 2001 — October 2003). Inspector General’s

Report. Central Intelligence Agency. May 7.

(http://luxmedia.com.edgesuite.net/aclu/IG_Report.pdf) (Accessed January 20,

2011.)

Horton, Scott. “The Guant�namo Lawyers —Six Questions for Mark Denbeaux and

Jonathan Hafetz.” November 23, 2009. Harper’s Magazine.

(http://www.harpers.org/archive/2009/11/hbc-90006117) (Accessed January 20,

2011.)

Human Rights First. “Military Commissions.”

(http://www.humanrightsfirst.org/us_law/detainees/militarytribunals.aspx)

Lefkowitz, Josh. 2008. “Terrorists Behind Bars” May 5, 2008.

(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/TerroristsBehindBar

s.pdf)

Leo, Richard A. 2000. “Questioning the Relevance of Miranda in the Twenty-First

Century.” Michigan Law Review 99:1000.

Markon, Jerry and Josh White. “Bin Laden Driver Gets 51/2 Years; U.S. Sought 30.”

Washington Post. August 8, 2008. (http://www.washingtonpost.com/wp-

dyn/content/article/2008/08/07/AR2008080700248_2.html?sid=ST200808080003

8&s_pos=) (Accessed January 20, 2011.)

McCarthy, Andrew. “Gitmo Does Not Cause Terrorism.” December 17, 2009. National

Review Online.

(http://article.nationalreview.com/print/?q=NWJhNjU2YzBlNjE1ZGMzYmU2MzEw

ZmZkNGI2YzIyY2Y=) (Accessed January 20, 2011.)

McCarthy, Andrew. “Holder’s Haste Makes Waste of Intel.” January 7, 2010. National

Review Online.

(http://article.nationalreview.com/print/?q=YmQwZWZlY2RjMTc0NjdhMTNjNzkyZj

ZiYTVlYTA3Yzc=) (Accessed January 20, 2011.)

McCarthy, Andrew. “Kill or Capture?” February 18, 2010. National Review Online.

(http://article.nationalreview.com/print/?q=YWY4NmFkZmRlNDcyMDI0OWI2NzF

hNTQ2YmVjZjAyZmI=) (Accessed January 20, 2011.)

McCarthy, Andrew. “No Compromise on Enemy Combatants.” February 12, 2010.

National Review Online.

(http://article.nationalreview.com/print/?q=ZjkzNDk5ODkwOWI5MmQzZmU3Nzk2

NjcxYzIyMDQwM2Q=) (Accessed January 20, 2011.)

McCarthy, Andrew. “Reversing Obama on the KSM Trial.” December 2, 2009. National

Review Online.

(http://article.nationalreview.com/print/?q=MzIwMmIxMWQyZTEyZDRiMjI4ZjU0Y

mUyZTkyNjM4OGY=) (Accessed January 20, 2011.)

McCarthy, Andrew. “September 10? It’s Worse Than That.” November 13, 2009.

National Review Online.

(http://article.nationalreview.com/print/?q=ZjNjZTljN2MxMGI4MTJkNTMxODA4Yj

A5MGNiMmRlYWM=) (Accessed January 20, 2011.)

McCarthy, Andrew. “The Gitmo Volunteers.” March 5, 2010. National Review Online.

(http://article.nationalreview.com/print/?q=Mjg3ZWRlNTIzMDUxOTk2NDdhYzgw

MWVmZjEzNzQwNTI=) (Accessed January 20, 2011.)

Napolitano, Andrew. “The Case Against Military Tribunals.” November 29, 2009.

(http://www.latimes.com/news/opinion/la-oe-napolitano29-

2009nov29,0,6594004.story) (Accessed January 20, 2011.)

Ryan, Joe. 2010. “N.J. Terror Suspects to Appear in Court for Bail Hearing.” The Star-

Ledger. June 10, 2010.

EXTENDED B IB L I OGRAPHY

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Page 60: COUNTERTERRORISM SINCE 9/11

Savage, Charlie. 2009. “Accused 9/11 Mastermind to Face Civilian Trial in N.Y..” The

New York Times, November 14

http://www.nytimes.com/2009/11/14/us/14terror.html (Accessed January 20,

2011).

Soder, Brenda Bowser. 2009. “Statement From 16 Retired Admirals And Generals, Who

Have Been Working Through Human Rights First, On Meeting Today With

President Obama To Discuss Executive Orders Banning Torture And Closing

Guantanamo.” January 22, 2009.

(http://www.humanrightsfirst.org/category/media-room/press-releases/page/32/)

(Accessed January 20, 2011.)

Weiser, Benjamin and Colin Moynihan. 2010. “Guilty Plea in Plot to Bomb Times

Square.” The New York Times. June 21, 2010.

Weiser, Benjamin, and Colin Moynihan. 2010. “Guilty Plea in Plot to Bomb Times

Square.” The New York Times, June 21

(http://www.nytimes.com/2010/06/22/nyregion/22terror.html) (Accessed January

20, 2011.)

Wikisourse. “Verbatim Transcript of Combatant Status Review Tribunal Hearing for ISN

10024.”

(http://en.wikisource.org/wiki/Verbatim_Transcript_of_Combatant_Status_Review

_Tribunal_Hearing_for_ISN_10024)

Wittes, Benjamin. “Justice Delayed.” March 2006. The Atlantic.

(http://www.theatlantic.com/magazine/archive/2006/03/justice-delayed/4600/)

(Accessed January 20, 2011.)

Yoo, John. “The KSM Trial Will Be an Intelligence Bonanza for Al Qaeda.” November

15, 2009. Wall Street Journal.

http://online.wsj.com/article/SB1000142405274870443180457453737066583285

0.html

Zabel, Richard B. and James J. Benjamin, Jr. 2009. “In Pursuit of Justice: Prosecuting

Terrorism Cases in the Federal Courts.” August 2009. HumanRightsFirst.org.

(http://www.humanrightsfirst.org/2009/08/23/5655/) (Accessed January 20, 2011.)

¢ THE TERRORIST THREATBeck, Ulrich. 2009. World At Risk. English ed. Cambridge UK; Malden MA: Polity.

Behrens, C., and M. Holt. 2005. “Nuclear Power Plants: Vulnerability to Terrorists

Attack.” Congressional Research Service, February 4.

Bergen, Peter and Bruce Hoffman. 2010. “Assessing the Terrorist Threat: A Report of

the Bipartisan Policy Center’s National Security Preparedness Group.” Bipartisan

Policy Center. Washington, D.C. September 10.

Bergen, Peter and Paul Cruickshank. 2008. The Unraveling. The New Republic. June

11. (http://www.tnr.com/article/the-unraveling-0) (Accessed January 25, 2011)

Bergen, Peter. 2002. Holy War, Inc.: Inside the Secret World of Osama bin Laden. 1st

ed. Free Press.

Bergen, Peter. 2006. The Osama bin Laden I know: An Oral History of Al-Qaeda’s

leader. 1st Ed. New York: Free Press.

Bergen, Peter. 2010. Why U.S. Can’t Find Osama bin Laden. Cnn, International.

October 18.

(http://edition.cnn.com/2010/WORLD/asiapcf/10/18/afghanistan.bin.laden/index.h

tml?iref=allsearch) (Accessed January 25, 2011)

60

Crenshaw, Martha. 1986. “The Psychology of Political Terrorism,” in Political

Psychology: Contemporary Problems and Issues, pp. 379-413, edited by

Margaret G. Hermann. San Francisco: Jossey-Bass, 1986. Reprinted in John T.

Jost and Jim Sidanius, eds., Political Psychology: Key Readings (Taylor and

Francis, 2004).

Crenshaw, Martha. 1995. Terrorism in Context. University Park, PA: Pennsylvania State

University Press.

Crenshaw, William A. 1988. Annals of the American Academy of Political Science, Vol.

498, The Private Security Industry: Issues and Trends, pp. 60-69. July 1988.

(http://www.jstor.org/stable/1045381) (Accessed January 25, 2011)

“Declassified_NIE_Key_Judgments.pdf (application/pdf Object).”

(http://www.dni.gov/press_releases/Declassified_NIE_Key_Judgments.pdf)

(Accessed January 21, 2011.)

Department of State. 2001. “Patterns of Global Terrorism.”

(http://www.state.gov/documents/organization/10319.pdf) (January 21, 2011.)

Department of State. 2002. “Patterns of Global Terrorism.”

(http://www.state.gov/documents/organization/20177.pdf) (Accessed January 21,

2011.)

Department of State. 2003. “Patterns of Global Terrorism.”

(http://www.state.gov/documents/organization/31912.pdf) (Accessed January 21,

2011.)

Department of State. 2004. “Country Reports on Terrorism.”

(http://www.state.gov/s/ct/rls/crt/c14818.htm) (Accessed January 21, 2011.)

Department of State. 2005. “Country Reports on Terrorism.”

(http://www.state.gov/s/ct/rls/crt/2005/) (Accessed January 21, 2011.)

Department of State. 2006. “Country Reports on Terrorism.”

(http://www.state.gov/s/ct/rls/crt/2006/index.htm) (Accessed January 21, 2011.)

Department of State. 2007. “Country Reports on Terrorism.”

(http://www.state.gov/documents/organization/105904.pdf) (Accessed January

21, 2011.)

Department of State. 2008. “Country Reports on Terrorism.”

(http://www.state.gov/documents/organization/122599.pdf)

Dershowitz, Alan. 2002. Why Terrorism Works: Understanding the Threat, Responding

to the Challenge. New Haven: Yale University Press.

Doran, Michael. 2002. “The Pragmatic Fanaticism of Al Qaeda.” Political Science

Quarterly. V117: Summer. P177-190.

Farah, Douglass. 2008. “NEFA - criminal terrorist nexus.” Nefa Foundation, January 14,

2008. (http://www1.nefafoundation.org/miscellaneous/nefapipelines0108.pdf)

Farrall, Leah. “Hotline to the jihad.” December 7, 2009. The Australian.

(http://www.theaustralian.com.au/news/features/hotline-to-the-jihad/story-

e6frg6z6-1225807501121) (Accessed January 21, 2011.)

Federation of American Scientists. 2010. “Chemical Weapons Production and Storage.”

(http://www.fas.org/programs/bio/chemweapons/production.html) (Accessed

January 21, 2011.)

Geiger, H. J. 2001. “Terrorism, Biological Weapons, and Bonanzas: Assessing the Real

Threat to Public Health.” American Journal of Public Health 91:708.

Gerges, Fawaz A. 2005. The Far Enemy. Cambridge University Press.

German, Mike. 2007. Thinking Like a Terrorist: Insights of a Former FBI Undercover

Agent. 1st ed. Washington D.C.: Potomac Books.

EXTENDED B IB L I OGRAPHY

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

Page 61: COUNTERTERRORISM SINCE 9/11

61

Glenn, David. “Anthropologists in a War Zone: Scholars Debate Their Role.” November

30, 2007. The Chronicle of Higher Education.

(http://chronicle.com/article/Anthropologists-in-a-War-Zone-/34710) (January 21,

2011.)

Graham, Bob, and Commission on the Prevention of Weapons of Mass Destruction

Proliferation and Terrorism (U.S.). 2008. World at Risk: The Report of the

Commission on the Prevention of WMD Proliferation and Terrorism. 1st ed. New

York: Vintage Books.

Hoffman, Bruce. 2006. Inside terrorism. Rev. and expanded ed. New York: Columbia

University Press.

Knobler, S., A. A.F Mahmoud, and L. A Pray. 2002. Biological Threats and Terrorism:

Assessing the Science and Response Capabilities: Workshop Summary.

National Academy Press.

Kohlmann, Evan F. 2007. “NEFA - Abu Jihaad Expertreport.pdf.” Nefa Foundation,

August 2007.

(http://www1.nefafoundation.org/miscellaneous/abujihaadexpertreport.pdf)

(Accessed January 21, 2011)

Kohlmann, Evan F. 2007. “NEFA - Al Qaeda Media Organizations.” Nefa Foundation,

2007.

(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefajihadmedia0309

.pdf) (Accessed January 21, 2011.)

Kohlmann, Evan F. 2007. “NEFA - Amawi et al.” Nefa Foundation, August 2007.

(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/amawiexpertreport0

608.pdf) (Accessed January 21, 2011.)

Kohlmann, Evan F. 2007. “NEFA - Core Al Qaeda in 2008.” Nefa Foundation, 2007.

(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefa_AQin2008.pdf)

(Accessed January 21, 2011.)

Kunreuther, H., E. Michel-Kerjan, and B. Porter. 2003. “Assessing, managing, and

financing extreme events: dealing with terrorism.” National Bureau of Economic

Research Working Paper No.10179. (http://www.nber.org/papers/w10179)

(Accessed January 21, 2011.)

Leitenberg, Milton. 2009. “Assessing the Threat of Biological Weapons and

Bioterrorism: A Public Policy Issue?” Presentation. Cornell University. April 16,

2009.

Lewis, J. A. 2002. “Assessing the Risks of Cyber Terrorism, Cyber War and Other

Cyber Threats.” Center for Strategic and International Studies 1–12.

National Counter-Terrorism Center. 2009. “2008 Report on Terrorism.”

(http://wits.nctc.gov/ReportPDF.do?f=crt2008nctcannexfinal.pdf) (Accessed

January 21, 2011.)

National Intelligence Council. 2007. “The Terrorist Threat to the Homeland.”

(http://www.dni.gov/press_releases/20070717_release.pdf) (Accessed January

21, 2011.)

“NEFA - German Pakistan Aleem Nasir.”

(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefa_AleemNasirNe

twork0609.pdf) (Accessed January 21, 2011.)

“NEFA - London bombings.”

(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefa721bombings.p

df) (Accessed January 21, 2011.)

“NEFA - Saudi Al Qaeda.” (http://nefafoundation.org/miscellaneous/qaidasaudi02-

03.pdf) (Accessed January 21, 2011.)

“NEFA - Spanish Suicide Bombers.”

(http://www1.nefafoundation.org/miscellaneous/nefaspainmartyrs08.pdf)

(Accessed January 21, 2011.)

“NEFA - Taliban during Peace Accord Era.”

(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefatalibanpakfebm

ay08.pdf) (Accessed January 21, 2011.)

“NEFA - terrorism big picture STRATEGY.”

(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefafarahhousefarh

affairs.pdf) (Accessed January 21, 2011.)

“NEFA - The Madrid Indictment.”

(http://www.nefafoundation.org/miscellaneous/nefaaqspain1107.pdf) (Accessed

January 21, 2011.)

“NEFA - US v. Mohammad Ibrahim Shnewer et al.”

(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefa_ekftdixexpertr

eport.pdf) (Accessed January 21, 2011.)

“NEFA - Zarqawi’s Network.”

(http://nefafoundation.org/miscellaneous/zarqawichart1005.pdf) (January 21,

2011.)

“NEFA: Pakistan Takes on Taliban in Bajaur.”

(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/nefa_ttp0709part1.p

df) (January 21, 2011.)

NEFA Foundation. “CIAWINPAC_WMDJanDec2008.”

(http://www.nefafoundation.org/miscellaneous/FeaturedDocs/CIAWINPAC_WMD

JanDec2008.pdf) (Accessed January 21, 2011.)

Noah, Timothy. “Why Hasn’t America Been Attacked Since 9/11?” September 11, 2009.

Slate Magazine. (http://www.slate.com/id/2227968?obref=obinsite) (Accessed

January 21, 2011.)

Parachini, J. 2003. “Putting WMD Terrorism into Perspective.” The Washington

Quarterly 26:37–50.

Pew Research Center. “Declines in Muslim Support for Bin Laden and Suicide

Bombing.” September 27, 2009. The New York Times.

(http://www.nytimes.com/imagepages/2009/09/27/weekinreview/20090927_SHA

NE_GRFK.html) (Accessed January 21, 2011.)

Rapoport, David. “Four Waves of Modern Terrorism.” UCLA International Institute

(http://www.international.ucla.edu/article.asp?parentid=47153) (Accessed

January 21, 2011.)

Sageman, Marc. 2008. Leaderless Jihad: Terror Networks in the Twenty-First Century.

Philadelphia: University of Pennsylvania Press.

Scahill, Jeremy. 2010. Killing Reconciliation. The Nation. October 27.

(http://www.thenation.com/article/155622/killing-reconciliation) (Accessed

January 25, 2011)

Tavares, J. 2004. “The Open Society Assesses its Enemies: Shocks, Disasters and

Terrorist Attacks.” Journal of Monetary Economics 51:1039–1070.

Tierney, John. 2002. “Even for $25 Million, Still No Osama bin Laden.” The New York

Times, December 1

Tucker, J. B. 2000. Toxic Terror: Assessing Terrorist Use of Chemical and Biological

Weapons. The MIT Press.

¢ SOCIAL SCIENCE OF SECURITY

Basu, A. 2005. “Social Network Analysis of Terrorist Organizations in India.” Pp. 26–28

in North American Association for Computational Social and Organizational

Science (NAACSOS) Conference.

EXTENDED B IB L I OGRAPHY

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Page 62: COUNTERTERRORISM SINCE 9/11

Bier, V. M. 2005. “Game-Theoretic and Reliability Methods in Counter-Terrorism and

Security.” Mathematical and Statistical Methods in Reliability (Wilson et al.,

editors), Scientific: Singapore, 17–28.

Brass, D. J, K. D Butterfield, and B. C Skaggs. 1998. “Relationships and Unethical

Behavior: A Social Network Perspective.” The Academy of Management Review

23:14–31.

Carley, K. M. 2006. A Dynamic Network Approach to the Assessment of Terrorist

Groups and the Impact of Alternative Courses of Action. Institute for Software

Research International, SCS, Carnegie Mellon University. (http://www.dtic.mil/cgi-

bin/GetTRDoc?AD=ADA477116&Location=U2&doc=GetTRDoc.pdf) (Accessed

January 21, 2011.)

Carley, K. M., J. Reminga, and S. Borgatti. 2003. “Destabilizing Dynamic Networks

Under Conditions of Uncertainty.” Pp. 121–126. International Conference on

Integration of Knowledge Intensive Multi-Agent Systems. September 30 –

October 4.

Centre for the Study of Civil War, International Peace Research Institute. “Data on

Armed Conflict.” 2007. http://www.prio.no/CSCW/Datasets/Armed-Conflict/

Creighton, C., and M. Shaw. 1987. The Sociology of War and Peace. Palgrave

Macmillan.

Deflem, M. 2004. “Social Control and the Policing of Terrorism: Foundations for a

Sociology of Counter-Terrorism.” The American Sociologist 35:75–92.

Deflem, Mathieu. 2010. The Policing of Terrorism: Organizational and Global

Perspectives. New York: Routledge.

Dillon, M. 2007. “Governing Through Contingency: The Security of Biopolitical

Governance.” Political Geography 26:41-47.

Dillon, M. 2008. “Underwriting security.” Security Dialogue 39:309.

Dillon, M. and Luis Lobo-Guerrero. 2008. “Biopolitics of Security in the 21st Century: An

Introduction.” Review of International Studies 34:265-292.

Dorn, Walter L. 1931. “The Prussian Bureaucracy in the Eighteenth Century.” Political

Science Quarterly 46:403-423.

Drake, Michael S. 2007. “Sociology and New Wars in the Era of Globalization.”

Sociology Compass 1:637-650.

Eban, Katherine.“The War on Terror: Rorschach and Awe.” Vf.com July 17, 2007.

(http://www.nickflynn.org/bomb_ticking_pdfs/23_eban.pdf)

Fogarty, B. E. 2000. War, Peace, and the Social Order. Westview Press.

Foucault, Michel. 1995. Discipline and Punish: The Birth of the Prison. 2nd ed. New

York: Vintage Books.

Foucault, Michel. N.D. Security, Territory, Population. Edited Transcript of Lectures at

the College de France 1977-1978. Editors: Michel Senellart. Palgrave Macmillan.

Frey, B. S, and S. Luechinger. 2004. “Decentralization as a Disincentive for Terror.”

European Journal of Political Economy 20:509–515.

Friedmann, W. 1956. “Some Impacts of Social Organization on International Law.” Am.

J. Int’l L. 50:475.

Ghosh, Tushar. 2010. Science and Technology of Terrorism and Counter-Terrorism. 2nd

ed. Boca Raton: CRC Press.

Hayes, Brian. “Connecting the Dots: Can the Tools of Graph Theory and Social-Network

Studies Unravel the Next Big Plot?” September 2006. American Scientist.

94:400–404.

(https://www.americanscientist.org/issues/id.3495,y.2006,no.9,content.true,page.

3,css.print/issue.aspx) (Accessed January 21, 2011.)

62

Hennessy, Bernard. “Book Reviews: Man, the State and War. By Kenneth N. Waltz.”

Political Research Quarterly. New York: Columbia University Press. 1959. Vol. 13

(1): 255. (http://prq.sagepub.com/cgi/reprint/13/1/255) (January 21, 2011.)

Hermann, Margaret G., and Charles W. Kegley. 1995. “Rethinking Democracy and

International Peace: Perspectives from Political Psychology.” International

Studies Quarterly 39:511-533.

Ivie, R. L. 1974. “Presidential Motives for War.” Quarterly Journal of Speech

60:337–345.

Jackson, R. 2005. Writing The War on Terrorism: Language, Politics and Counter-

Terrorism. Manchester University Press.

Jordan, F. 2008. “Predicting Target Selection by Terrorists: A Network Analysis of the

2005 London Underground Attacks.” International Journal of Critical

Infrastructures 4:206–214.

Kaplan, R. D. 2006. Imperial Grunts: On the Ground with the American Military, from

Mongolia to the Philippines to Iraq and Beyond. Vintage.

Kennedy, L. W., and C. M. Lum. n.d. “Developing a Foundation for Policy Relevant

Terrorism Research in Criminology. 2003.” Rutgers University: New Brunswick.

Kenney, M. 2003. “From Pablo to Osama: Counter-Terrorism Lessons from the War on

Drugs.” Survival 45:187–206.

Kestnbaum, M. 2009. “The Sociology of War and the Military.” Annual Review of

Sociology 35:235–254.

Klare, Michael. 2002. Resource Wars: The New Landscape of Global Conflict. 1st ed.

New York: Henry Holt.

Krebs, Ronald R. 2009. “In the Shadow of War: The Effects of Conflict on Liberal

Democracy.” International Organization 63:177-210.

Krebs, V. E. 2002. “Uncloaking terrorist networks.” First Monday. Volume 7,

No. 4. April 1.

Krebs, Valdis. “Social Network Analysis of the 9-11 Terrorist Network.” Orgnet.com.

(http://www.orgnet.com/hijackers.html) (Accessed January 21, 2011.)

Lang, K. 1972. Military Institutions and the Sociology of War: A Review of the Literature

with Annotated Bibliography. Sage Publications, Inc.

Langholtz, Harvey. 2004. The Psychology of Diplomacy. Westport Conn.: Praeger.

Lawless, W. F, M. Bergman, J. Lou�a, N. N Kriegel, and N. Feltovich. 2007. “A

Quantum Metric of Organizational performance: Terrorism and Counter-

Terrorism.” Computational & Mathematical Organization Theory 13:241–281.

Lemke, D. 2003. “Investigating the Preventive Motive for War.” International Interactions

29:273–292.

Loader, I. 2000. “Plural Policing and Democratic Governance.” Social & Legal Studies

9:323.

Luard, E. 1986. War in International Society: A Study in International Sociology. IB

Tauris & Company.

Male?evic, S. 2008. “The Sociology of New Wars? Assessing the Causes and

Objectives of Contemporary Violent Conflicts.” International Political Sociology

2:97–112.

Mann, Michael. 1986. The Sources of Social Power: Vols 1-2. Cambridge University

Press.

McCulloch, J., and S. Pickering. 2009. “Pre-Crime and Counter-Terrorism: Imagining

Future Crime in the ‘War on Terror’.” British Journal of Criminology 49:628.

EXTENDED B IB L I OGRAPHY

C O U N T E RT E R R O R I S M S I N C E 9 / 1 1 S P R I N G 2 0 1 1

Page 63: COUNTERTERRORISM SINCE 9/11

63

North, Douglass, J.J. Wallis, and B. Weingast. 2009. Violence and Social Orders:

A Conceptual Framework for Interpreting Recorded Human History. Cambridge;

New York: Cambridge University Press.

Omestad, Thomas. 1994. “Psychology and the CIA: Leaders on the Couch.” Foreign

Policy 105-122.

Pedahzur, A., and A. Perliger. 2006. “Changing Nature of Suicide Attacks: A Social

Network Perspective, The.” Social Forces. 84:4, 1987-2008.

Piazza, James A. 2009. “Is Islamist Terrorism More Dangerous? An Empirical Study

of Group Ideology, Organization, and Goal Structure.” Terrorism and Political

Violence 21:62.

Piegorsch, W. W, S. L Cutter, and F. Hardisty. 2007. “Benchmark analysis for

quantifying urban vulnerability to terrorist incidents.” Risk Analysis

27:1411–1425.

Rapoport, David. 2006. “Four Waves of Modern Terrorism.” UCLA International Institute

(http://www.international.ucla.edu/article.asp?parentid=47153) (Accessed

January 21, 2011.)

Rice, Stephen K. “Emotions and Terrorism Research: A Case for a Social-Psychological

Agenda.” Journal of Criminal Justice 37:248-255.

Richardson, L. F. 1960. Arms and insecurity: A Mathematical Study of the Causes and

Origins of War. Boxwood Press.

Rodriguez, J.A. 2005. “The March 11th Terrorist Network: In its Weakness Lies Its

Strength.” in XXV International Sunbelt Conference, Los Angeles.

Schmid, Alex P. 2004. “Frameworks for Conceptualizing Terrorism.” Terrorism and

Political Violence 16:197.

Scott, John. 2000. Social Network Analysis: A Handbook. 2nd ed. London: Sage

publications.

Sethi, K. 2009. “New World, New War: Understanding Global Jihad.”

Honors Projects 19.

Shane, Scott. “Words as Weapons - Dropping the ‘Terrorism’ Bomb.” April 2, 2010.

New York Times.

(http://www.nytimes.com/2010/04/04/weekinreview/04shane.html?ref=weekinrevi

ew) (Accessed January 21, 2011.)

Shapiro, S. 2002. “Conflict Media Strategies and the Politics of Counter-Terrorism.”

Politics 22:76–85.

Shaw, M. 2005. “The New Western Way of War: Risk-Transfer War and Its Crisis in

Iraq.” Polity.

Simonton, Dean Keith. 1998. “Introduction Political Leadership: Part I—World Heads of

State.” The Leadership Quarterly 9:239-242.

Smil, Vaclav. 2008. Global Catastrophes and Trends: The Next 50 years. Cambridge

MA: The MIT Press.

Sorokin, P. A. 1928. “The Sociology of War.” Contemporary Sociological Theories.

Harper: New York 49–102.

Sorokin, P. A. 1928. “Sociological Interpretation of the Struggle for Existence.”

Contemporary Sociological Theories. Harper: New York 49–102.

Steinley, D., S. Wasserman, and I. University. 2006. “Approximate Distributions of

Several Common Graph Statistics: Hypothesis Testing Applied to a Terrorist

Network.” Proceedings of the American Statistical Association, Statistical

Applications in Defense and National Security. Santa Monica, CA: RAND

Corporation.

Strachey, A. 1957. The Unconscious Motives of War: A Psycho-Analytical Contribution.

Allen & Unwin.

Suedfeld, Peter, and Dana C. Leighton. 2002. “Early Communications in the War

against Terrorism: An Integrative Complexity Analysis.” Political Psychology

23:585-599.

Taipale, K. A. 2005. “Destabilizing Terrorist Networks: Disrupting and Manipulating

Information Flows in the Global War on Terrorism.” Working Paper 05:04:01.

The Stilwell Center for Advanced Studies in Science and Technology Policy.

(http://www.information-retrieval.info/papers/infowar/Taipale-DTN-031805.pdf)

(Accessed January 21, 2011.)

The Minerva Initiative, Department of Defense. (http://minerva.dtic.mil/) (Accessed

January 21, 2011.)

Turk, A. T. 2004. “Sociology of Terrorism.” Annual Review of Sociology 30:271-286.

Tyler, Tom. 2006. Why People Obey the Law. Princeton N.J.: Princeton University

Press.

Volpp, Leti. 2001. “The Citizen and the Terrorist.” UCLA Law Review. 49:1575.

Waltz, Kenneth. 2001. Man, The State, and War: A Theoretical Analysis. New York:

Columbia University Press.

Weinberg, Leonard, Ami Pedahzur, and Sivan Hirsch-Hoefler. 2004. “The Challenges of

Conceptualizing Terrorism.” Terrorism and Political Violence 16:777.

Weisburd, David. 2009. To Protect and to Serve: Policing in an Age of Terrorism.

Dordrecht; New York: Springer.

EXTENDED B IB L I OGRAPHY

S P R I N G 2 0 1 1 C O U N T E RT E R R O R I S M S I N C E 9 / 1 1

Page 64: COUNTERTERRORISM SINCE 9/11

4 3 6 1 4 T H S T R E E T, S U I T E 8 2 0 , O A K L A N D , C A 9 4 6 1 2 , P H O N E : 5 1 0 - 5 5 0 - 8 8 0 0 ,

W E B S I T E : w w w. t h e b r e a k t h r o u g h . o r g

S P R I N G 2011

COUNTERTERROR ISM S INCE 9 /11 EVALUAT ING THE E F F I CACY OF CONTROVERS IAL TACT ICS